UI Slides

download UI Slides

of 123

Transcript of UI Slides

  • 8/13/2019 UI Slides

    1/123

  • 8/13/2019 UI Slides

    2/123

  • 8/13/2019 UI Slides

    3/123

  • 8/13/2019 UI Slides

    4/123

  • 8/13/2019 UI Slides

    5/123

  • 8/13/2019 UI Slides

    6/123

  • 8/13/2019 UI Slides

    7/123

  • 8/13/2019 UI Slides

    8/123

  • 8/13/2019 UI Slides

    9/123

  • 8/13/2019 UI Slides

    10/123

  • 8/13/2019 UI Slides

    11/123

  • 8/13/2019 UI Slides

    12/123

  • 8/13/2019 UI Slides

    13/123

  • 8/13/2019 UI Slides

    14/123

  • 8/13/2019 UI Slides

    15/123

  • 8/13/2019 UI Slides

    16/123

  • 8/13/2019 UI Slides

    17/123

  • 8/13/2019 UI Slides

    18/123

  • 8/13/2019 UI Slides

    19/123

  • 8/13/2019 UI Slides

    20/123

  • 8/13/2019 UI Slides

    21/123

  • 8/13/2019 UI Slides

    22/123

  • 8/13/2019 UI Slides

    23/123

  • 8/13/2019 UI Slides

    24/123

  • 8/13/2019 UI Slides

    25/123

  • 8/13/2019 UI Slides

    26/123

  • 8/13/2019 UI Slides

    27/123

  • 8/13/2019 UI Slides

    28/123

  • 8/13/2019 UI Slides

    29/123

  • 8/13/2019 UI Slides

    30/123

  • 8/13/2019 UI Slides

    31/123

  • 8/13/2019 UI Slides

    32/123

  • 8/13/2019 UI Slides

    33/123

  • 8/13/2019 UI Slides

    34/123

  • 8/13/2019 UI Slides

    35/123

  • 8/13/2019 UI Slides

    36/123

  • 8/13/2019 UI Slides

    37/123

  • 8/13/2019 UI Slides

    38/123

  • 8/13/2019 UI Slides

    39/123

  • 8/13/2019 UI Slides

    40/123

  • 8/13/2019 UI Slides

    41/123

  • 8/13/2019 UI Slides

    42/123

  • 8/13/2019 UI Slides

    43/123

  • 8/13/2019 UI Slides

    44/123

  • 8/13/2019 UI Slides

    45/123

  • 8/13/2019 UI Slides

    46/123

  • 8/13/2019 UI Slides

    47/123

  • 8/13/2019 UI Slides

    48/123

  • 8/13/2019 UI Slides

    49/123

  • 8/13/2019 UI Slides

    50/123

  • 8/13/2019 UI Slides

    51/123

  • 8/13/2019 UI Slides

    52/123

  • 8/13/2019 UI Slides

    53/123

  • 8/13/2019 UI Slides

    54/123

  • 8/13/2019 UI Slides

    55/123

  • 8/13/2019 UI Slides

    56/123

  • 8/13/2019 UI Slides

    57/123

  • 8/13/2019 UI Slides

    58/123

  • 8/13/2019 UI Slides

    59/123

  • 8/13/2019 UI Slides

    60/123

  • 8/13/2019 UI Slides

    61/123

  • 8/13/2019 UI Slides

    62/123

  • 8/13/2019 UI Slides

    63/123

  • 8/13/2019 UI Slides

    64/123

  • 8/13/2019 UI Slides

    65/123

  • 8/13/2019 UI Slides

    66/123

  • 8/13/2019 UI Slides

    67/123

  • 8/13/2019 UI Slides

    68/123

  • 8/13/2019 UI Slides

    69/123

  • 8/13/2019 UI Slides

    70/123

  • 8/13/2019 UI Slides

    71/123

    Project Management

  • 8/13/2019 UI Slides

    72/123

    Project Management The software

    Used to help manage a project.Planning, monitoring and control of the variousactivities or resources that contribute to its success.

    Project managementIdentifying the activities that need to be carried out tocomplete the project.For each activity - duration; cost; resources;employees; inter-relationships - all need to beassigned .

    Activities scheduled to ensure efficiency.Plan output as PERT or Gantt chart.

    Software packagesMicrosoft Project; CA SuperProject and Hoskyns

    Project Managers Workbench.

    Personal Information Management

  • 8/13/2019 UI Slides

    73/123

    Personal Information Management

    Personal information management software

    (PIM) is a type of software applicationdesigned to help users organise random bitsof information.

    PIMs enable you to enter various kinds oftextual notes such as reminders, lists anddates - and to link these bits of information

    together in useful ways.

    Many PIMs also include calendar,scheduling, and calculator programs.

    Word Processing Software

  • 8/13/2019 UI Slides

    74/123

    Word Processing Software Data objects

    characters, words paragraphsgraphic objects.

    OperationsFile menu performed on whole files.

    Edit menu cut, copy and paste.View menu including headers and footers.Insert menu page break, date/time, picture, etc.Format menu format text (an extensive menu).Tools menu Mail merge, spelling and grammar, options and

    customisation.Table menu Insert table then table operations.Window and Help much as in other Windows applications.Formatting functions are found mostly in the format menu andalso on the icons on the menu line with B I U on it.

    Desk Top Publishing

  • 8/13/2019 UI Slides

    75/123

    Desk Top Publishing

    Standard File, Edit, View, Window, Help. Also Layout, Type, Element Utility.

    most of the formatting functions here. Also a Toolbox.

    Arrow and Text, basic drawing tools, and a colour palette.

  • 8/13/2019 UI Slides

    76/123

    Desk Top Publishing

    Advanced operations and functionsPage LayoutHeaders and Footers

    ColumnsMulti-Page LayoutPaginationContents and Indexing

    Style SheetsFont Selection Serif v San-SerifColour use

  • 8/13/2019 UI Slides

    77/123

    Desk Top Publishing

    Inserting graphicsClip artScanned pictures

    Digital camera Formatting

    graphicsHow graphic

    behaves on the pageSquare, tight, infront of, behind.

    A graphic formatted with TightLayout means text flows around it.

  • 8/13/2019 UI Slides

    78/123

    Web Authoring Software

    Page structureIndividual pages linked to form a site.

    Incorporation of graphics Used to enhance appearance of the page.Graphics should be JPEG or GIF size matters.Graphics linked to the page (not pasted in).

    Presentation style Font selection limited, careful use of colour.

    Navigation

    Pages linked together by Hyperlinks.Set Home Page, use arrows, bookmarks, history.

    TemplatesUse style sheets to provide common fonts, colours, etc.

    Presentation Software

  • 8/13/2019 UI Slides

    79/123

    Presentation Software Page structure

    Individual slides follow a linear pattern, can behyperlinked. Incorporation of graphics

    Used to enhance appearance of the page.Graphics inserted into slide, embedded in the page.

    Presentation styleFont selection vast, careful use of colour.

    NavigationMove to next slide by click of mouse.Slides can be linked together by hyperlinks.

    TemplatesVarious pre-prepared templates available.Can make up own template as a slide master.

    Spreadsheet Software

  • 8/13/2019 UI Slides

    80/123

    Spreadsheet Software

    Data Objects Cells and groups of cellsContaining text, numbers, formulas.

    Operations File menu performed on whole files. Edit menu cut, copy and paste. View menu including headers and footers. Insert menu rows, columns, worksheet, functions. Format menu format cells including numeric like

    currency as well as standard text formatting.

    Tools menu spelling protection and macros. Data menu Sort, filter and pivot tables. Window and Help much as in other Windows

    applications. Formatting functions are found mostly in the format menu

    and also on the icons on the menu line with B I U on it.

    Spreadsheet Software

  • 8/13/2019 UI Slides

    81/123

    Spreadsheet Software Advanced functions

    Goal seeking Automatically change values until desired result achieved.Forecasting

    Calculates or predicts a future value by using existingvalues.

    Look-up tables Can be used to insert text in a cell depending on a value. E.g. Grades or Pass/Fail from an exam mark.

    Nested IF Using an IF function within an IF function.

    Count Gets the number of entries in a range of cells (COUNTA

    for text values).Macros

    A sequence of instructions that can be used to automate a

    task.

    Project Management

  • 8/13/2019 UI Slides

    82/123

    Project Management

    Timelining Shows how and when a task needs to be completed before thenext one starts.

    Resource allocationSoftware tools to help match up the materials, machines,

    people and money.Maximising profits or achieving best quality.

    Gant and PERTT charts Gant shows timings of each activity in a chart.PERTT shows relationship between activities.

    Optimisation & Critical Path AnalysisA mathematical process concerned with the optimisation oftime.Used for very complicated processes (managing a productionline).

  • 8/13/2019 UI Slides

    83/123

    Personal Information Management (PIM)

    Such as Microsoft Outlook:Contacts - can be thought of as a verycomprehensive address book.Calendar - lets the user keep a diary of events,

    meetings, appointments and activities.Task list - also called a To -do list. It keeps a listof all the tasks that require to be carried out andreminds the user when each task is due to becompleted.Communication e-mail. Most PIM applicationssupport sending, receiving and management ofemails.

    Evaluation of Software

  • 8/13/2019 UI Slides

    84/123

    Evaluation of Software

    Range of Data ObjectsAre the objects appropriate to the software?e.g. graphics and audio files important for web design.

    Range of OperationsAppropriate to software database should have good searchand sort and reporting.

    Formatting FunctionsLook at fonts, style, graphics handling, paragraphing, textwrap, numerical formats, etc.

    HCIUse of keyboard commands, menus, toolbars and icons.

    Help and TutorialsMost packages have on-line help and tutorials.Often displayed as web pages but are NOT on the Internet.

  • 8/13/2019 UI Slides

    85/123

  • 8/13/2019 UI Slides

    86/123

    Social Implications

    Ease of access and availability Information rich / poor Impact of IS on social structures Educational qualifications and ICT

    Knowledge workers Online retail Globalisation The impact on business of an IS-driven business

    model Identities and personas Privacy

    Ease of Access and Availability

  • 8/13/2019 UI Slides

    87/123

    Ease of Access and Availability

    Access to Internet at work and home.Digital satellite TV with all its services.Access to magazines, books & newspapers.Access in social lives libraries and Internetcafes.We expect Internet access on holiday and inhotel rooms.

    Fact There are more telephones in the city of New York than the continent of Africa (andtelephones give access to information).

  • 8/13/2019 UI Slides

    88/123

    Information rich/Information poor

    Information rich They will:Have easy access to computers and electronic communications.Get information and news from the InternetBuy the latest products through on-line shopping.

    Follow computer-based learning and skills training courses athome.Look for jobs that are advertised solely on the Internet.Find it easier to get well-paid jobs and will enjoy a morecomfortable and secure life-style.

    Information poor They will not :Have easy access to computers.Have the IT skills and confidence to take part in teleshopping,telebanking, Internet chat and news groups.

    Impact of IS on Social Structures

  • 8/13/2019 UI Slides

    89/123

    FamiliesFeel more secure with two wages coming into the

    family.More mothers have careers and they may not haveany children till they are 30 or older.Is this change in family patterns partly caused by

    computerisation?Are there any risks to the family and to society as awhole from this development?

    BanksUsed to be paper based and only for middle and upperclasses for reasons of wealth and trust.Use of IT means anyone can have a bank account transaction processing and high levels of security.

    Now widespread use of plastic money credit and

    debit cards.

    Educational Qualifications and ICT

  • 8/13/2019 UI Slides

    90/123

    Educational qualifications

    Qualifications in Computing since the early 1960s, but these were solely in universities and colleges.By mid-1980s computing was available in schools.By 1999 the two strands of software and hardwaredivided into Computing and Information Systems.

    Now there are very many different courses offeredat degree and NC level, all related to ICT.

    Need for ICT awareness ICT lets people vote by text on game shows, shopon the Internet, use digital TV to order goods.Families send digital photos round the world.Almost all office jobs and professionals need to useICT.

    Knowledge Workers

  • 8/13/2019 UI Slides

    91/123

    Knowledge Workers Knowledge worker

    A person who adds value by processing existing information to

    create new information that could be used to define and solve problems. Examples of knowledge workers

    Lawyers, doctors, diplomats, law-makers, software developers,managers and bankers.

    People who use their intellect to convert their ideas into products, services, or processes.Problem solvers rather than production workers.Use intellectual rather than manual skills to earn a living.

    Core knowledge workers

    Those in specific knowledge management roles. Knowledge managers, librarians, content managers, informationofficers, knowledge analysts, etc.

    Everyone else

    All the other knowledge workers everyone engaged in some

    form of knowledge work.

  • 8/13/2019 UI Slides

    92/123

    Online Retail

    Internet shopping the here and now.Young people much more likely to shop onlinethan older people.Young people spend on low-value goods (CDs,

    DVDs, books and hair straighteners).Older people spend on high-value items likeholidays and make repeat grocery orders.

    Why Internet shop?

    Goods can be difficult to buy locally.Goods are often much cheaper.

    National chains carry the same goods theInternet gives wider choice.

    Advantages and Disadvantages of Online Shopping

  • 8/13/2019 UI Slides

    93/123

    g g pp g

    Consumer advantagesMore choice of goods online.

    Cheaper prices.Home delivery Grocery shopping on-line very useful foryoung families.

    Consumer disadvantagesOften long delivery times.

    Temptation to spend more money than intended.Social isolation (supermarkets are the new social scene).

    On-line Retailer advantagesCan reach a far wider audience.Doesnt need expensive showrooms. Doesnt need to employ trained sales staff.

    On-line Retailer disadvantagesMust spend money on a website with secure payment system.Must accept a high rate of returns.

    Never meets customers.

  • 8/13/2019 UI Slides

    94/123

    l b l

  • 8/13/2019 UI Slides

    95/123

    Globalisation

    GlobalisationIs the growing integration of economies and societies aroundthe world.Has been a hotly debated topic in economics.

    Positive aspects Rapid growth and poverty reduction in China, India, and

    other countries that were poor 20 years ago.Negative aspects

    It has increased inequality.

    It contributes to environmental degradation. It is most conspicuous in huge companies producing

    products as diverse as oil, Cola and burgers.

    Impact of IS on Business and

  • 8/13/2019 UI Slides

    96/123

    pSocieties

    Multinational companies As diverse as Cola and Oil technology. Achieved globalisation through the use of information

    systems.

    Originally a few large companies with mainframecomputers. Confined to major US networks and European cities.

    Present-day examples of globalisation Smaller companies have global presence. Communicate via dedicated worldwide intranet. Publish reports, memos, etc & e-mail round the world. Dont need mainframe systems. Use web and mail servers to communicate.

    The Impact on Business of an IS-

  • 8/13/2019 UI Slides

    97/123

    pDriven Business Model

    Traditional businessesHave embraced IT with open arms.Have had IT forced upon them and adapted.

    Modern IS-driven businessesCompanies without High Street branches.Call centre based companies.Advertise heavily on TV.

    Much lower overheads than maintaining anetwork of branches.Call centres can bring employment to smallertowns rather than cities.

    Id i i & P

  • 8/13/2019 UI Slides

    98/123

    Identities & Personas

    Using the Internet as a medium of communicationChange is having a dramatic impact on peoples lives. Ability to communicate with anyone regardless of age, sex,location, background, etc.The Internet allows people to develop different identities and

    personas when communicating.Can join chat rooms and newsgroups and offer an expertopinion even when not an expert.

    DisadvantagesCriminal offence of grooming via the Internet.

    Parents wary of letting teenagers have use of the Internet.Fear of the Internet among certain groups in society.

    Read aboutJonathan Lebed and Marcus Arnold (either online or in thenotes).

    P i

  • 8/13/2019 UI Slides

    99/123

    Privacy

    Private communications across the InternetShould be secure and safe.We feel we have a right to this privacy.Websites we visit should be our business.

    National security or criminal actionsTerrorists use e-mail, mobile phones and the Internet tocommunicate amongst themselves.Criminals use the Internet to host websites.

    What about our privacy?Security organisations can scan all e-mail and mobile

    phone messages looking for tell-tale phrases.FBI caught thousands of paedophiles across USA andEurope via their IP address and phone number.

    Legal Implications of

  • 8/13/2019 UI Slides

    100/123

    g pInformation Systems

    The Data Protection Act 1998 Computer Misuse Act 1990

    Copyright Designs and Patents Act 1988 The Regulation of Investigatory Powers Act

    2000 The Freedom of Information Act (Scotland)

    2002 Health and safety regulations

    Th 1998 D P i A

  • 8/13/2019 UI Slides

    101/123

    The 1998 Data Protection Act

    The 8 data protection principlesPersonal data shall be processed fairly and lawfully.Personal data shall be obtained only for lawful purposes.Personal data shall be adequate, relevant and not excessive.Personal data shall be accurate and kept up to date.

    Personal data shall not be kept for longer than is necessary.Personal data shall be processed in accordance with the rightsof data subjects.Appropriate measures shall be taken against unauthorised orunlawful processing of data.Personal data shall not be transferred to a country outside

    Europe. In the UK, data must be registered with the Data

    Commissioner.

    Th 1998 D P i A

  • 8/13/2019 UI Slides

    102/123

    The 1998 Data Protection Act

    Unconditional exemptions:Data related to national security.Data which by law has to be made public (e.g.the voters roll).

    Data held by the Police and National HealthService.

    Conditional exemptions:Mailing lists (names and addresses).

    Data used for calculating and paying wages.Information used for club memberships.Data used by a data subject at home.

    Th 1998 D t P t ti A t

  • 8/13/2019 UI Slides

    103/123

    The 1998 Data Protection Act

    Rights of data subjects:To see any personal data stored either electronically ormanually about them.The data controller may ask that a small fee be paid to covertheir costs in providing the data.

    To have their data corrected if it is inaccurate.To prevent their data being used by companies to send them

    junk mail.

    Responsibilities of data users: Have to register with the Data Protection Registrar if they wishto hold personal information about data subjects.They must be willing to let data subjects see data held aboutthem, and must amend any false data without charge.Data users must also be willing to remove subjects names andaddresses from mailing lists if asked to.

    The 1998 Data Protection Act

  • 8/13/2019 UI Slides

    104/123

    The 1998 Data Protection Act

    Changes from the 1984 Act: The 1984 DPA had certain shortcomings: It only covered data in electronic form. Companies could circumvent certain provisions. It had no European or worldwide dimension. There was no obligation on data users to tell the data

    subjects that they held any data about them.

    The 1998 Act: Covers the transmission of data in electronic form,

    which was not really an issue in 1984. Harmonised the European Union Data Protection

    legislation. It also made it a requirement of the Act to ask for the

    prior consent of data subjects to have data held aboutthem, and it included paper-based records.

    C t Mi A t

  • 8/13/2019 UI Slides

    105/123

    Computer Misuse Act

    The Act contains three sections covering:Unauthorised access to computer material

    Basic hacking e.g. breaking into the school network,locking a user out of the system, etc.

    Unauthorised access with intent to commit orfacilitate commission of further offences

    Where a computer system is used to help commit a crime.

    Unauthorised modification of computer material

    Expert hacking modification of data without permission. Also covers the transmission of viruses.

    Copyright, Designs & Patents Act

  • 8/13/2019 UI Slides

    106/123

    Software licencing

    Software can be legally installed on as manycomputers as the licence allows.Shareware can be used legally for 30 days theneither paid for or deleted.Freeware can be downloaded and used free ofcharge.

    Computer applicationsDatabases can store vast amounts of copyright data.Act covers extracts from computer databases.Plagiarism to copy work directly from the Web.Music downloads must be paid for and copyrightchecked.Software piracy a crime - FAST.

    The Regulation of Investigatory Powers Act 2000

  • 8/13/2019 UI Slides

    107/123

    The Regulation of Investigatory Powers Act 2000 Gives powers to:

    Police, Special Branch, GCHQ and MI5.Organisations are allowed to monitor employees, e-mail andWeb usage.It also provides powers to help combat the threat posed byrising criminal use of strong encryption to try to break intoelectronic transactions.

    The Act contains 5 partsIt allows the authorities to monitor our personal e-mail andInternet usage. So businesses, local authorities and governmentdepartments can and do monitor internal e-mails. They can alsomonitor Internet usage of staff, students and pupils.

    It sounds very Big Brother. May enrage and disturb many people to realise this.But when terrorists can be anywhere in our society it may be arelief to know that the authorities are taking active steps tocatch them.

    The Freedom of Information Act (Scotland) 2002

  • 8/13/2019 UI Slides

    108/123

    From 1 January 2005General right of public access to all types of 'recorded'

    information held by public authorities.Sets out exemptions from that general right.Places a number of obligations on public authorities.The Act applies only to 'public authorities' and not to privateentities.

    Public authorities include Government departments, localauthorities and many other public bodies, and also schools,colleges and universities.The Act is enforced by the Scottish InformationCommissioner.

    Responsibilities of public authorities Required to adopt and maintain a Publication Scheme.This sets out the classes of information available (e.g.

    prospectuses, almanacs and websites); the manner in whichthey intend to publish the information; and whether a chargewill be made for the information.

    Health and Safety Regulations

  • 8/13/2019 UI Slides

    109/123

    Health and Safety Regulations

    Covers physical aspects of workSeating: Is the seating comfortable and not causing strain?Lighting: Is the lighting adequate for the work?

    Employee injuries, etc.Repetitive Strain Injury (RSI): Caused by doing the samerepetitive task too long (e.g. typing numbers all day on thenumber pad).Radiation: Not so much of a problem now but the big old

    monitors emitted a lot of radiation and were very dangerous.Eye Strain: Caused by spending too much time looking at thescreen.

    Health and Safety Regulations

  • 8/13/2019 UI Slides

    110/123

    Health and Safety Regulations

    Requirements on employers:To carry out a risk assessment .Employers with five or more employeesneed to record the significant findings ofthe risk assessment.Risk assessment should bestraightforward in a simple workplacesuch as a typical office.To provide a safe and secure workingenvironment.

    Economic Implications of ICT

  • 8/13/2019 UI Slides

    111/123

    Economic Implications of ICT

    Type of jobs and costs in ICT The effect of new ICT on business Business and ICT Business costs

    Jobs in ICT

  • 8/13/2019 UI Slides

    112/123

    Jobs in ICT

    Starting positionsProgrammer / analyst: Responsible for programdevelopment and modification.Web administrator: Responsible for developing,

    managing and co-ordinating the posting of companymaterial from departments onto the companywebsite.Network administrator: Responsible for the day-to-day management and maintenance of the

    network.Salaries: In the region of 20,000 to 30,000depending on the level of responsibility.

    Jobs in ICT

  • 8/13/2019 UI Slides

    113/123

    Jobs in ICT

    Advanced development positionsDatabase manager: Responsible for identifyingneeds and developing software accordingly. Thereis an increasing role for data mining and datawarehousing experts in this field.Project leader and senior analyst: Sometimesseparate posts, sometimes a joint post the projectleader will liaise with directors and top managersand translate ideas into computer relateddocumentation.IT manager: Generally in charge of the entire IToperation, staff and equipment.Salaries: These senior posts can carry very highsalaries with fringe benefits such as company cars.

    The Effect of New ICT on Business

  • 8/13/2019 UI Slides

    114/123

    The Effect of New ICT on Business

    CostsInvesting in a new computerised systemis very expensive.Staff training is a major cost.

    Benefits Increased productivity (fewer staff).Increased functionality.Reports from the computerised systemcan save the expense of professionals.

  • 8/13/2019 UI Slides

    115/123

    Business Costs

  • 8/13/2019 UI Slides

    116/123

    Business Costs

    Initial costsHuge costs to set up a production line,

    just-in-time ordering, or a call centre.Computers, software, robots, etc.

    Running costsStaff required.Paper, ink cartridges, back-up media.Software licences.Maintenance contracts.

    Ethical Implications of ICT

  • 8/13/2019 UI Slides

    117/123

    Ethical Implications of ICT

    Netiquette Intellectual property rights (IPR) Censorship Regulating the content of the Internet Privacy and encryption

    Global citizenship

    Netiquette

  • 8/13/2019 UI Slides

    118/123

    Netiquette

    General pointsTreat others the way you expect to be treated.Act within the law.Act responsibly and ethically.

    AdviceDo not type e-mails in capitals shouting.Always fill in the subject field.Dont abuse people flaming.Always minimise or compress large files.Do not forward stupid jokes and chain letters.Do not forward hoax virus warnings.

    Intellectual Property Rights

  • 8/13/2019 UI Slides

    119/123

    Intellectual Property Rights

    Written workKnowledge is the principal source of competitiveadvantage.All original work published on the Internet has

    IPR.IPR applies also to software.

    Music, etcIPR relates to the Internet sites where music can

    be downloaded.Copyright material must usually be paid for asthe publishers of the music own the IPRs.

    Censorship

  • 8/13/2019 UI Slides

    120/123

    Censorship

    On the InternetCurrent UK censorship laws may not beadequate.Operators of questionable sites can host sites in

    countries without such laws.Controls can hinder freedom of speech. Now if you visit an illegal site (even if it is legalin its host country) you can be prosecuted.Should spam be illegal freedom of speech?Visiting an illegal site by accident can be a validdefence (e.g. if its description bears noresemblance to the actual contents).

    Regulating the content of the

  • 8/13/2019 UI Slides

    121/123

    Internet Dubious material on the Internet

    Conscious access needs to be made before offensive orunacceptable material is displayed. Software can be installed that will monitor what accesses aremade from which terminals, when and by whom.

    Internal organisational procedures should deal with this type ofsituation.

    Contravening legislation on the InternetInternet is no different from other media it too can contravenelegislation on sensitive matters.

    Successful libel cases have been taken out against bulletin- board operators for the materials published on their boards.Is current legislation enough? Presumably only time will tell.Future governments and public opinion will influence newlegislation.

    Privacy and Encryption

  • 8/13/2019 UI Slides

    122/123

    Privacy

    Text messages, mobile calls, e-mail and Internet usage can all be monitored by security organisations.Criminals are using technology to try and intercept and read

    personal information.If we are to trust online shopping, then the online vendors mustapply security to their site.

    EncryptionEnsures that a card number is encrypted when it leaves theshoppers computer until it arrives safely at the vendorswebsite.PGP (Pretty Good Privacy) uses a 32-bit encryption procedure.PGP is unbreakable and is used by good online retailers whowill usually advertise the fact.They may also subscribe to a code of practice (like the Which?Code for Internet Shopping ) based on PGP and 32-bitencryption.

    ICT and Global Citizenship

  • 8/13/2019 UI Slides

    123/123

    ICT and Global Citizenship

    Study of citizenshipGives students the knowledge, skills and understanding to play an effective role in society at local, national andinternational levels.Global citizenship is generally thought of as being aware

    of global issues such as environment, commerce, politicsand society in general.

    Use of ICT in citizenshipIf a student is studying citizenship then the use of theInternet means that information and discussion papers can

    be found and studied very easily. Newsgroups exist on a wide range of citizenship topics informed and serious discussions