Professional Documents
Culture Documents
CETech Notes
CETech Notes
Information technology (IT) and its increasing dominance in everyday life have established it as a discontinuous
innovation, one that establishes new behavior patterns and transforms old ones in our daily environments,
including vacations, travel, and leisure time.
The internet, television, mobile phones, computer-based devices and other new forms of information
technology are changing at a rapid pace with potentially profound but also subtle influences on social life.
Information technology is the technology used to store, manipulate, distribute or create information. All these
can be summed up easily – It’s having knowledge, and knowledge comes from having information.
Gaining knowledge through information is the role of ‘’information technology’’ IT in today’s informed world.
Life has become much less manual and a lot hassle-free for people all around the globe that have active access
to the innovations of information technology.
Information technology literally refers to any development that mainly involves computer-based information
systems comprising of software applications and the computer hardware.
A more conventional and perhaps contemporary meaning of the information system is the use of electronic
systems that can assist towards retrieving the required information.
Information technology in the modern day and age has a lot to do with communication and accessibility which is
mostly why the use of technology (computers) is associated with information.
Communication covers a huge part of what information technology is for the people of the modern age because
when we think of accessibility and an easy life, we automatically point towards technological innovations such as
the Internet and the mobile phones along with a thousand other inventions.
There are many ways through which information technology has become such as integral part of our daily lives;
we have incorporated it into our lives as a part of routines.
For instance, we plan our busy schedules on our personal laptops or on our cellular phones. This shows how
much we depend on information technology that we
have even started planning our lives and goals by the help of it.
Indeed, it has made life extremely organized and structured but at the same time we have failed to acknowledge
the threats and dangers that it brings along with it.
We cannot ignore the fact that there are over thousands and thousands of cyber intrusions each day which has
ended up affecting the lives of people in an
unfavorable manner.
For example, online banking systems have allowed hackers to steal money and many awful incidents have taken
place because of this technological advancement and facility provided to the people.
Thousands of years past and the importance of technology have been greatly influencing
our own society. Evidence shows that our ancestor was using different kinds of apparatus to convey information
to its recipient. Some make fire to produced smoke signals, others use pens and paper to transport data to
different places.
Information technology before was at some sort limited in every sector of banking industry, engineering
business and computer society.
It’s been a long time since we are confronted by the importance of information technology; the only difference
was how advance it is in terms of usability.
But how important is the advancement of information technology into our lives? What is the part that this
technology can show in present society? Will it be beneficial to all?
As a general view, information technology today permits us to gather, handle and interconnect a gigantic
volume of information. And its sustainable development improves its competence, capability swiftness and
precisions of any components it provides.
Information technology has achieved a lot in this present era and will continue to evolve.
It’s more than a combination of computers and communication technology. It is indeed truthful to say that the
information technology has successfully infiltrated human existences, occupying the biggest part of every
lifestyle; the importance of information technology; touching lives.
Along with specific contributions to certain fields, information technology also has a few general advantages for
society.
Advantages
o With improvements in information technology, globalization has increased. The world is brought closer,
and the world’s economy is quickly becoming a single interdependent system. Information can be
shared quickly and easily from all over the globe, and barriers of linguistic and geographic boundaries
can be torn down as people share ideas and
information with each other.
o Communication has become an easier, cheaper, and faster system with the help of information
technology.
o Using the internet, people can speak to each other all over the world using video conferencing.
o Skype is one helpful application that allows users to communicate to other Skype users for free.
o Social media is also another area of communication available because of information technology.
o It’s now easier than ever to share photos and information about your life with people you know all over
the world. This draws some families closer to family members they don’t get to see as often.
o Businesses have become more cost effective for both themselves and their consumers using information
technology.
o By streamlining, businesses increase their productivity. This pays out to greater profits, which allows
companies to offer better pay and less strenuous working conditions.
o Programmers, systems analyzers, hardware and software developers, and web designers all owe their
jobs to information technology.
Disadvantages
o Unfortunately, along with the creation of new and interesting jobs, information technology has also led
to a rise in unemployment.
o By streamlining the business process, job redundancies, downsizing, and outsourcing has occurred.
Many low and middle level jobs have been turned to other countries, leaving more people unemployed.
o Many people also credit information technology with a lack of job security. As new technology is
released and jobs require more and more training, it’s important for employees to stay in a learning
mode in order to keep their job.
IT is a set of tools that can help provide the right people with the right information at the right time. Though IT is
not a solution to everything, for IT to work, people Must learn how to use it.
Innovation is the great way to success in this digital age. The path of innovation in business means doing
something different, smarter or better that will make
a positive difference in terms of value, quality or productivity by using emerging or proved technologies of the
world.
Currently online shopping, digital marketing, social networking, digital communication and cloud computing etc.
are the best examples of change which came through the wave of information technology.
Now accurate business planning, effective marketing, global sales, systematic management, real time
monitoring, instant customer support and long-term business growth cannot be achieved at the optimum level
without IT.
The success of every business depends on certain factors. Some of which are accurate analysis, choosing the
right technology and the future vision. Research from the last two decade has proved that those organizations
that do invest in technology and choose the path of innovation increase their market share, financial figures and
overall competitiveness.
Information technology is the only technology which provides you the opportunity to analyses specific data and
plan your business journey accordingly.
It also provides you many tools which can solve complex problems and plan the scalability (future growth) of
your business.
In the modern age, it is proved that digital marketing is a great tool which let you promote your products or
services to the global market while sitting in the
comfort of your remote office or home.
DECISION MAKING
Speed and accuracy are at the heart of making right decision for your business. Every successful organization has
to go through a comprehensive market research process which enables management to make the right decision.
Market research can be done in many ways through online surveys, forums, blogs, and group discussions using
World Wide Web and of course through in-person interviews as well.
Currently Big data, Google Analytics and Microsoft CRM Dynamics are also great tools to extract useful
information which can impact on decision making.
These online tools not only provide real time responses from the potential audience but also ensure the
accuracy of data by minimizing the risk of human errors.
The heart of the business success lies in its marketing which enables the management to identify its target
audience first and then observe their trends and needs.
The overall marketing covers public relation, advertising, promotion and sales which subsequently impact on
business growth.
DIGITAL MARKETING
Digital Marketing is a modern phenomenon which let you promote your products or services all over the world.
It is a broad term which includes many concepts like search engine optimization (SEO), pay per click (PPC),
blogging, discussion forum, email shot, SMS, MMS, social media marketing and Smartphone app advertisement
etc.
CUSTOMER SUPPORT AND SATISFACTION
Higher level of customer satisfaction is the key to success which cannot be achieved without a real time
customer support process.
Business success depends on knowing its customer’s needs, trends, behaviors and satisfaction level.
Effective communication is the best tool to understand the customer demands, problems and their solutions.
IT provides many channels to communicate with the customer without going out in snow or rain. Some of these
channels are email, webinar, social media, member portals, online newsletters and text or multimedia
messaging through the smart phone.
Enterprise organizations normally use customer relationship management systems (CRM) to hold valuable data
for understanding customer behaviors and future needs.
When it comes to medium or large organization, it is very hard for the top management to manage all the
resources manually.
A decade ago, most of the resource management solutions were desktop based.
Thanks to the internet and cloud technology which enables software engineers to introduce cloud-based ERP
(Enterprise Resource Planning) solutions.
Now, the managers can manage or monitor their organizational resources virtually anywhere in the world by
using their personal computer, laptops, tablets or Smartphone.
MODULE 2
INTERNET OF THINGS
Introduction to IoT
What is IoT
Network of Physical Objects
Internet of Things (IoT) comprises things that have unique identities and are connected to the Internet
The focus on IoT is in the configuration, control and networking via the Internet of devices or “Things” that are
traditionally not associated with the internet
o Eg: pump, utility meter, car engine
IoT is a new revolution in the capabilities of the endpoints that are connected to the internet
The Scope of IoT is not limited to just connecting things (device, appliances, machines) to the Internet
IoT allows these things to communicate and exchange data (control& information)
Processing on these data will provide us various applications towards a common user or machine goal
Internet of Things is a plan to connect things also using the same medium
Applications of IoT
IoT Applications: Intelligent Home
Smart Egg Tray
Egg Minder syncs with your smartphone to tell you how many eggs you’ve got at home (up to 14 eggs) and when
they’re going bad.
Smart Aqualtis is the first Indesit Company washing machine designed to be integrated in “Smart” ecosystems,
covering a wide range of use cases.
Smart Lighting
Control your bulbs one at a time or altogether. Find just the right shade of white. Pick that perfect tone to match
the moment. Or recreate any color from a photo.
Smart A/C
Aros learns from your budget, location, schedule, and usage to automatically maintain the perfect temperature
and maximize savings for your home.
Visualize your sleep cycles, understand what makes you up, and compare nights. From the palm of your hand,
you can control your personalized wake-up, and fall-asleep programs.
The Netatmo Weather Station allows you to use indoor temperature, relative humidity and CO2 readings to live
in a healthier home.
Enjoy remote access to all your slow cooker’s functions, no matter where you are.
BigBelly alerts when it needs to be emptied so smarter collection decisions can be made.
Smart Gardening
Bitponics gives data o plants and conditions surrounding them for batter gardening.
IoT Applications: Transportation
Logistic
Product Design
Warehouse
Manufacturing
IoT Architecture
IoT Technologies
Hardware (Device)
Communication Technology
Protocols for IoT
Software (IDE)
Cloud Platforms
Implementing Smart Objects
Board Connection
Connectivity
Power Management
Security
Rapid Evolution
SECURITY
Users need to trust that IoT devices and related data services are secure from vulnerabilities, especially as this
technology become more pervasive and integrated into our daily lives.
Poorly secured IoT devices and services can serve as potential entry points for cyber-attack and expose user data
to theft by leaving data streams inadequately protected.
Developers and users of IoT devices and systems have a collective obligation to ensure they do not expose users
and the Internet itself to potential harm.
PRIVACY
Privacy rights and respect for user privacy expectations are integral to ensuring user trust and confidence in the
Internet, connected devices, and related services.
IoT amplifies concerns about the potential for increased surveillance and tracking, difficulty in being able to opt
out of certain data collection, and the strength of aggregating IoT data streams to paint detailed digital portraits
of users.
Strategies will need to be developed to respect individual privacy choices across a broad spectrum of
expectations, while still fostering innovation in new technology and services.
INTEROPERABILITY / STANDARDS
While full interoperability across products and services is not always feasible or necessary, purchasers may be
hesitant to buy IoT products and services if there is integration inflexibility, high ownership complexity, and
concern over vendor lock-in.
Poorly designed and configured IoT devices may have negative consequences for the networking resources they
connect to and the broader Internet.
Appropriate standards, reference models, and best practices also will help curb the proliferation of devices that
may act in disrupted ways to the Internet.
Data collected by IoT devices is sometimes susceptible to misuse, potentially causing discriminatory outcomes
for some users.
Other legal issues with IoT devices include the conflict between law enforcement surveillance and civil rights;
data retention and destruction policies; and legal liability for unintended uses, security breaches or privacy
lapses.
While the legal and regulatory challenges are broad and complex in scope, adopting the guiding Internet Society
principles of promoting a user’s ability to connect, speak, innovate, share, choose, and trust are core
considerations for evolving IoT laws and regulations that enable user rights.
IoT holds significant promise for delivering social and economic benefits to emerging and developing economies.
This includes areas such as sustainable agriculture, water quality and use, healthcare, industrialization, and
environmental management, among others.
IoT holds promise as a tool in achieving the United Nations Sustainable Development Goals. The broad scope of
IoT challenges will not be unique to industrialized countries. Developing regions also will need to respond to
realize the potential benefits of IoT.
The unique needs and challenges of implementation in less-developed regions will need to be addressed,
including infrastructure readiness, market and investment incentives, technical skill requirements, and policy
resources.
MODULE 3
Internet Marketing
Branding
Brand
o Typically defined as a name, logo or symbol that helps one identify a company’s products or services
o Customers’ experience can be considered part of its brand
Brand equity
o Includes the value of tangible and intangible items, such as a brand and its monetary value over time,
customer perceptions and customer loyalty to a company and its products or services
Internet-only businesses must develop a brand that customers trust and value
Demographics
o Statistics on human population, including age, sex, marital status and income
Psychographics
o Can include family lifestyle, cultural differences and values
Segmentation
o Can be based on age, income, gender, culture and common needs and wants
Traditional focus groups can allow customers to touch, smell and experience products or services
Online surveys
o Conducted from Web site or through e-mail
o InsightExpress.com, GoGlobal Technologies and QuickTake
o Test your site and marketing campaign on a smaller scale with focus groups and trials
Data collected from a company’s Web site
Marketing-research firms
o Forrester Research, Adknowledge, Jupiter Communications and Media Metrix
Pricing
o Some products priced to reflect competition
o High pricing to influence perception of high-value
o Can use prices to position products and services on the Internet
Positioning includes affecting consumers’ overall views of a company and its products and
services as compared to the way those customers view competitors’ products or services
Positioning strategies can be based on price, quality, use and competitors’ positions in the
market
Distribution cost and time contributes to success or failure
Fulfillment
o Execute orders correctly and ship products promptly
E-mail Marketing
Promotions
E-business Advertising
Traditional
o Television, movies, newspapers and magazines
Prime-time television slots most expensive times to air commercials
o (monster.com advertisement)
Establish and continually strengthen branding
o Brand is a symbol or name that distinguishes a company and its products or services from its
competitors and should be unique, recognizable and easy to remember
Publicize URL on direct mailings and business cards
Online advertising
o Place links on other sites, register with search engines
Banner Advertising
Banner ads
o Located on Web pages, act like small billboards, usually contain graphics and an advertising message
o Benefits include:
Increased brand recognition, exposure and possible revenue
o Side panel ads or skyscraper banners
Advertisements that lie vertically on Web sites
o Banner advertisements are losing their effectiveness
Industry has calculated click-through rates at around .5 percent
o Place logo on banners, enhancing brand recognition
Inventive color schemes and movement
o Flashing, scrolling text, pop-up boxes and color changes
Pop-up box is a window containing an advertisement that appears separate from the screen the
user is viewing, pops up randomly or as a result of user actions (can have a negative effect due
to their intrusive nature)
Determine the best position on sites for a banner
o Web sites cluttered with ads annoy visitors
Space can be more expensive during high traffic
Exchanging banners with another site
Adbility and BannerTips
Buy advertising space on sites that receive a large number of hits and target a similar market
Selling ad space provides additional income
Monthly charges for online advertising rarely used
CPM (cost per thousand)
o A designated fee for every one thousand people who view the site on which your advertisement is
located
Unique visitors versus total number of hits
o Visiting any site registers one unique visit
o Hits are recorded for each object that is downloaded
o To determine the value of a Web site for advertising purposes, use the number of unique visitors, not
total hits
Advertising payment options
o Pay-per-click: you pay the host according to the number of click-throughs to your site
o Pay-per-lead: you pay the host for every lead generated from the advertisement
o Pay-per-sale: you pay the host for every sale resulting from a click-through
Selling advertising space
o Provide appropriate contact information on your Web site
o Register with organizations that will sell your space for you
These companies typically charge a percentage of the revenue you receive from the
advertisements placed on your site
ValueClick, DoubleClick, AdSmart and LinkExchange
Media-Rich Advertising
Webcasting
o Involves using streaming media to broadcast an event over the Web
o Streaming video simulates television, streaming delivers a flow of data in real time.
Resource Marketing, Clear Digital, Navisite, Cyber-Logics, www.streamingmedia.com and
Macromedia
o Many people have relatively slow Internet access
o The slower the connection, the more disconnected the video appears
Victoria’s Secret Webcast most popular ever held on Web
Bursting
o There is a substantial build up of content at the receiving end, causing a video to appear smoother
Burst.com
Cross-media advertising or hybrid advertising
o Involves using a combination of rich media (such as audio, video, images and animations) and traditional
advertising forms (such as print, television and radio advertisements) to execute an advertising
campaign
o Involve consumers in the advertising process
Nike
WebRIOT, a game show on MTV
H2O Design and Lot21
Interactive television advertising
o Allows people viewing television to interact with what they are seeing on the screen
o Consumers have the ability to choose to learn more about an offer, make a purchase or even request
that customer service representatives contact them
o RespondTV
Wireless Advertising
(B2B) marketing
o Consider distributors, resellers, retailers and partners
o Selling to someone who is not the direct user
o Usually more than one person involved in purchasing process
o Businesses making large purchases depend on suppliers and expect reliability and delivery of quality
o products and services on time
o Personalization
Intranets and extranets
Industry marketplaces
o Construction.com, Worldwideretailexchange.com
o Connect Inc, Concur Technologies and Ariba
Search Engines
META Tags
META tag
o An HTML tag that contains information about a Web page
o Does not change how Web page is displayed
o Can contain description of page, keywords and title of page
Most search engines rank your site by sending out a spider to inspect the site
o The spider reads the META tags, determines the relevance of the Web page’s information and keywords
and ranks the site according to that visit’s findings
Examine competitors’ sites to see what META tags they are using
Top ten results
Search-Engine Registration
Affiliate Programs
Affiliate program
o A form of partnership in which a company pays affiliates (other companies or individuals) for
prespecified actions taken by visitors who click-through from an affiliate site to a merchant site
In this chapter, we discuss:
o Costs
o Benefits
o Program reward structures
o Program-building options
Tracking and affiliate solution providers
o Directories and search engines that provide affiliate- and partnering-program resources
Pay-per-click model
o Rewards an affiliate for each click-through that is generated from a banner ad hosted by the affiliate
A click-through is when a person clicks on the banner advertisement on the affiliate site and is
taken to the merchant site
o Easy for affiliates to generate dishonest click-throughs to “run up the numbers”
o Sites that depend on advertising rates use this model to increase traffic
o GoTo and Lycos
Pay-Per-Lead Model
Pay-per-lead model
o Rewards affiliates based on the number of qualified leads generated
Potential customers that have expressed interest in a product or service and meet requirements
determined by the company
Can include new customer registrations and having visitors sign up to receive a newsletter or use
a free demo
Mailsweeps.com
Pay-Per-Sale Model
Pay-per-sale model
o Also known as the commission-based model
o Compensates its affiliates for each sale resulting from affiliate-hosted advertisements
o Rewards to the affiliates based on sales are typically larger
o express.com
o Virtual store
Allows affiliates to sell merchant’s products without requiring visitor to leave the affiliate’s site
Multi-Tiered Model
Multi-tiered model
o Also known as the multi-level model
New affiliates are recruited by current affiliates, who are then rewarded with a percentage of
the new affiliates’ revenues
o Two-tiered model involves only the original affiliate and its recruits, also known as subaffiliates
ValueClick
Hybrid Model
Hybrid model
o Combines features of multiple models
o Can make an affiliate program more competitive
o Can increase the cost for the merchant
o FreeShop.com
Web-site “Stickiness”
Stickiness of a site
o The ability to keep people at a site and interested in its content
Update content frequently, carefully organize a site, provide quality customer service to keep visitors browsing
Merchants can offer virtual stores to affiliates
o Offer e-commerce capabilities to sites that want to participate in affiliate programs, but also want to
keep visitors at their sites
Nexchange and CrossCommerce
o Can control their brands’ presentation on affiliate sites
Becoming an Affiliate
Costs
o Merchant is required to pay the affiliate, with the amount depending on the prespecified terms of the
program
Costs can rise with increases in the number of click-throughs, purchases or other specified
actions
o Losing visitors through affiliate links
o Developing and implementing the program
Social Media
Social Media is defined by Boundless.com as interactive platforms where content is created, distributed
and shared by individuals on the web.
refers to interaction among people in which they create, share, and/or exchange information and ideas
in virtual communities and network.
To provide users with a rich experience, dynamic content, scalability, openness, and collective
intelligence (B., 2016, May 26).
Similarities –
o Designed to reach large numbers of people
o Made to inform audiences
Differences –
o Social media reaches users in a shorter amount of time
o Social Media gives audiences an opportunity to give feedback
Blogs/Microblogs
Collaborative Projects
Content Communities
Social Networking
Virtual Worlds
Blog Platforms
Tumblr
o Each user has his or her own Tumblelog where they can publish short posts of text, images,
quotes, links, video, audio, and chats (Gunelius, S, n.d.)
o Acquired by Yahoo! in 2013
o 550 million monthly users
o 280.4 million blogs (Smith, C., 2017, March 18)
Microblog Platform
Twitter
o Consists of broadcasting daily short burst messages to the world, with the hope that your
messages are useful and interesting to someone (Gil, P., n.d.)
o A “Tweet” is only 140 characters available to share information.
o 319 million users as of 2016
o 750 tweets per second (Raymondi, N., 2013, January 18)
Collaborative Project
Wikipedia
o A free encyclopedia, written collaboratively by the people who use it.
o 5,357,012 total articles
o 41,677,432 total pages
o 30,444,460 users with about 140,722 active (Statistics, 2017, March 16)
Content Communities
YouTube
o is a free video-hosting website that allows members to store and serve video content (What is
YouTube? - Definition from WhatIs.com, n.d.).
o Over 1 billion users (Almost one-third of people on the internet)
o More than half of YouTube views come from mobile devices
Social Networks
Facebook
o A popular free social networking website
o Debuted in February of 2004
o 1.86 billion active monthly users
Virtual Worlds
World of Warcraft
o A Massively Multiplayer Online Role-Playing Game (MMORPG)
o Released in 2004 by Blizzard Entertainment
o Passed 10 million subscribers in 2016 after releasing its 6th expansion called Legion (Kollar, P.,
2016, October 04).
Blog: Tumblr
Microblog: Twitter
Content Communities: Youtube
Social Networks: Facebook
Virtual Worlds: World of Warcraft
Allowed audiences to ‘like’, create, and post images/statuses, as well as upload video content
Council of Nonprofits gives multiple examples of the benefits of using social media:
o Builds awareness
o Organizational Growth
o Empower Supporters
On Youth
Seeking new job
Build relationship
It unleashes potential
It battles depression
Opportunity for writers
On Student:
Sharing class lecture
Group study
Class information
Building resumes
Online tutorials
On Health:
It modifies your appetite
Social media makes us restless.
Social media can damage physical and mental health.
Using social media Discourages physical exercise.
Social media is addictive.
23% of children between ages 0 to 5 use the internet & 82% use it on a weekly basis
1 billion tweets are posted per week
650+ million active users on Facebook
460k new accounts are created on Twitter per day
#1 online activity beating porn & personal email for total time spent online
50% log in per day
YouTube has 490+ million users worldwide
92 billion page views each month
400 tweets per minute containing a YouTube link
78 million monthly visitors on Wikipedia
More video content is uploaded to YouTube in a 60-day period than the three
Major U.S. television networks created in 60 years.
90 million users on linkedln
MODULE 6
Cloud Computing
“Cloud computing: A pool of abstracted, highly scalable, and managed infrastructure capable of hosting
end-customer applications and billed by consumption” FORRESTER
“Cloud computing is Web-based processing, whereby shared resources, software, and information are
provided to computers and other devices (such as smart phones) on demand over the Internet.”
WIKIPEDIA
• Sometimes free; easy to use; good consumer adoption; proven business models
• You can only use the application as far as what it is designed for
Private Cloud
• Owned and managed by the enterprise
• Limits access to enterprise and partner network
• Retains high degree of control, privacy and security
• Enables business to more easily customize service
• Accessed from "inside" the firewall
Public Cloud
• Owned and managed by service provider
• Delivers select set business process, application or infrastructure services on a “pay per use” basis
• Highly standardized
• Limited customization options
• Accessed from "outside" the firewall
Hybrid Cloud
A hybrid infrastructure takes advantage of both public and private clouds:
Services provided over the Internet—the public cloud
Services provided by the enterprise data center—the private Cloud
Windows Azure
“Windows Azure is an integrated cloud solution, utilizing Microsoft products already familiar with IT
professionals ”
Google App Engine
Google App Engine (GAE) is a service, offered by Google, that allows developers to build
applications that can run on Google’s infrastructure.
Cons
Security
Lock-in
Reliability
Lack of control
MODULE 7
Information transmitted over networks has a higher degree of security risk than information kept on an
organization’s premises
Computer Virus
o Affects a computer negatively by altering the way the computer works
Worm
o Copies itself repeatedly, using up resources and possibly shutting down the computer or
network
Trojan Horse
o A malicious program that hides within or looks like a legitimate program
Rootkit
o Program that hides in a computer and allows someone from a remote location to take full
control
Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities
Access controls define who can access a computer, when they can access it, and what actions they can
take
– Two-phase processes called identification and authentication
– User name
– Password
– CAPTCHA
A biometric device authenticates a person’s identity by translating a personal characteristic into a digital
code that is compared with a digital code in a computer
Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks
Many areas use digital forensics
o Law enforcement
o Criminal prosecutors
o Military intelligence
o Insurance agencies
o Information security departments
Software Theft
• Software theft occurs when someone:
- Steals software media
- Intentionally erases programs
- Illegally copies a program
- Illegally registers and/or activates a program
Software Theft
• Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law
• Some software requires product activation to function fully
Information Theft
• Information theft occurs when someone steals personal or confidential information
• Encryption is a process of converting readable data into unreadable characters to prevent
unauthorized access
Information Theft
• A digital signature is an encrypted code that a person, Web site, or organization attaches to an
electronic message to verify the identity of the sender
System Failure
• A system failure is the prolonged malfunction of a computer
• Two ways to protect from system failures caused by electrical power variations include surge
protectors and uninterruptable power supplies (UPS)
• Offsite backups are stored in a location separate from the computer site
Wireless Security
• Wireless access poses additional security risks
– About 80 percent of wireless networks have no security protection
• War driving allows individuals to detect wireless networks while driving a vehicle through the area
- A wireless access point should not broadcast a network name
- Change the default network name
- Configure a WAP so that only certain devices can access it
- Use WPA or WPA2 security standards
Intellectual property rights are the rights to which creators are entitled for their work
Digital rights management is a strategy designed to prevent illegal distribution of movies, music, and
other digital content
• Green computing involves reducing the electricity and environmental waste while using a computer
– ENERGY STAR program
• Information privacy refers to the right of individuals and companies to deny or restrict the collection
and use of information about them
• Huge databases store data online
• It is important to safeguard your information
Ethics and Society
• When you fill out a form, the merchant that receives the form usually enters it into a database
• Many companies today allow people to specify whether they want their personal information
distributed
• A cookie is a small text file that a Web server stores on your computer
• Phishing is a scam in which a perpetrator sends an official looking e-mail message that attempts to
obtain your personal and financial information
• Pharming is a scam where a perpetrator attempts to obtain your personal and financial information
via spoofing
• The concern about privacy has led to the enactment of federal and state laws regarding the storage
and disclosure of personal data
– See Figure 10-25 on page 406 for a listing of major U.S. government laws concerning privacy
• Employee monitoring involves the use of computers to observe, record, and review an employee’s use
of a computer
• Content filtering is the process of restricting access to certain material on the Web
Summary
- Potential computer risks and the safeguards
- Wireless security risks and safeguards
- Computer-related health issues and preventions
- Ethical issues surrounding information accuracy, intellectual property rights, green computing, and
information privacy