Copyright

Ch 15: Personal & Social Impact of Computers

About This Chapter

This self-paced chapter discusses the personal and societal impact of computers. You can access these engaging lessons and quizzes whenever you need to get ready for an exam, catch up in class, complete an assignment or give your grades a boost.

Personal & Social Impact of Computers - Chapter Summary

Check out this information systems chapter to explore current issues and concerns pertaining to the impact of computers on individuals and society. As you work through the chapter, you'll evaluate types of cyber threats and crimes, as well as computer security methods and intellectual property issues. To help you enjoy the studying experience, our expert instructors have designed these lessons to be simple, concise and memorable. Following each lesson is a short quiz to help you solidify your understanding of key terms and concepts. You can submit questions to our instructors if you get stuck, and the chapter is accessible at any time of day or night. Studying this chapter will help you:

  • Evaluate the impact of computers and technology on privacy and work environments
  • Define cyber crime and cyber terrorism
  • Understand computer security and threat prevention methods for organizations and individuals
  • Know how businesses respond to cyber crimes
  • Understand issues concerning open source software and intellectual property
  • Recognize different types of malware
  • Explain ethical issues pertaining to technology management in business

9 Lessons in Chapter 15: Personal & Social Impact of Computers
Test your knowledge with a 30-question chapter practice test
Impact of Computers on Work Environments

1. Impact of Computers on Work Environments

In this lesson, we will look at the impact computers have on the work environment. We will discuss the impacts on privacy, ethics, general efficiency, and the work environment as a whole.

Impact of Technology on Privacy

2. Impact of Technology on Privacy

Technology has a number of social and ethical implications that cause debate and concern. One specific issue is privacy. Information technology has opened up society and decreased privacy. This lesson will explore a number of privacy issues that are of concern, including electronic surveillance, availability of personal information, cookies and spyware, and workplace monitoring.

What Is Cyber Crime? - Definition, Types & Examples

3. What Is Cyber Crime? - Definition, Types & Examples

In this lesson, we will learn about cyber crimes. We will look at what these crimes are and what they mean. Then, we will take a closer look at some specific examples.

What is Cyber Terrorism? - Definition, Cases & Examples

4. What is Cyber Terrorism? - Definition, Cases & Examples

In this lesson, we'll learn about cyber terrorism, or terrorism occurring over electronic media and the Internet. We'll provide a few examples to help situate this topic within the larger concept of terrorism.

Computer Security & Threat Prevention for Individuals & Organizations

5. Computer Security & Threat Prevention for Individuals & Organizations

Computer security and threat prevention is essential for individuals and organizations. Effective security measures can reduce errors, fraud, and losses. This lesson will explore unintentional threats and intentional threats. Various security measures and defenses will be explored, including encryption, firewalls, anti-virus, anti-spyware, passwords, back-ups, and biometric security.

Cyber Crime in Business: Assessing Risk & Responding

6. Cyber Crime in Business: Assessing Risk & Responding

In this lesson, we'll take a look at cyber crime, what it is, how to assess and reduce the possible risks, and how to respond to cyber crimes if they occur.

Intellectual Property and Open Source Software: Issues and Concerns

7. Intellectual Property and Open Source Software: Issues and Concerns

One of the defining issues of the Internet era is intellectual property rights. The Internet has made it easy to access digital media and illegally copy it. This lesson will discuss intellectual property including protections through copyrights, trademarks and patents. We will also explore the open source movement and the growing trend toward free, unprotected software.

What is Malware? - Definition, Examples & Types

8. What is Malware? - Definition, Examples & Types

Viruses, worms, spyware, adware, hijackers, and Trojans. What do all of these things have in common? They're all forms of malware. In this lesson, we'll define malware and discuss some common types and examples.

Ethical Issues in Managing Technology in Business

9. Ethical Issues in Managing Technology in Business

It is a challenge for companies to balance the need for technology with the elements of privacy and security. Let's analyze some ethical issues, such as information security, balancing the privacy of employees with the need for monitoring employees, file sharing, and copyright infringement.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support