About This Chapter
Personal & Social Impact of Computers - Chapter Summary
Check out this information systems chapter to explore current issues and concerns pertaining to the impact of computers on individuals and society. As you work through the chapter, you'll evaluate types of cyber threats and crimes, as well as computer security methods and intellectual property issues. To help you enjoy the studying experience, our expert instructors have designed these lessons to be simple, concise and memorable. Following each lesson is a short quiz to help you solidify your understanding of key terms and concepts. You can submit questions to our instructors if you get stuck, and the chapter is accessible at any time of day or night. Studying this chapter will help you:
- Evaluate the impact of computers and technology on privacy and work environments
- Define cyber crime and cyber terrorism
- Understand computer security and threat prevention methods for organizations and individuals
- Know how businesses respond to cyber crimes
- Understand issues concerning open source software and intellectual property
- Recognize different types of malware
- Explain ethical issues pertaining to technology management in business
1. Impact of Computers on Work Environments
In this lesson, we will look at the impact computers have on the work environment. We will discuss the impacts on privacy, ethics, general efficiency, and the work environment as a whole.
2. Impact of Technology on Privacy
Technology has a number of social and ethical implications that cause debate and concern. One specific issue is privacy. Information technology has opened up society and decreased privacy. This lesson will explore a number of privacy issues that are of concern, including electronic surveillance, availability of personal information, cookies and spyware, and workplace monitoring.
3. What Is Cyber Crime? - Definition, Types & Examples
In this lesson, we will learn about cyber crimes. We will look at what these crimes are and what they mean. Then, we will take a closer look at some specific examples.
4. What is Cyber Terrorism? - Definition, Cases & Examples
In this lesson, we'll learn about cyber terrorism, or terrorism occurring over electronic media and the Internet. We'll provide a few examples to help situate this topic within the larger concept of terrorism.
5. Computer Security & Threat Prevention for Individuals & Organizations
Computer security and threat prevention is essential for individuals and organizations. Effective security measures can reduce errors, fraud, and losses. This lesson will explore unintentional threats and intentional threats. Various security measures and defenses will be explored, including encryption, firewalls, anti-virus, anti-spyware, passwords, back-ups, and biometric security.
6. Cyber Crime in Business: Assessing Risk & Responding
In this lesson, we'll take a look at cyber crime, what it is, how to assess and reduce the possible risks, and how to respond to cyber crimes if they occur.
7. Intellectual Property and Open Source Software: Issues and Concerns
One of the defining issues of the Internet era is intellectual property rights. The Internet has made it easy to access digital media and illegally copy it. This lesson will discuss intellectual property including protections through copyrights, trademarks and patents. We will also explore the open source movement and the growing trend toward free, unprotected software.
8. What is Malware? - Definition, Examples & Types
Viruses, worms, spyware, adware, hijackers, and Trojans. What do all of these things have in common? They're all forms of malware. In this lesson, we'll define malware and discuss some common types and examples.
9. Ethical Issues in Managing Technology in Business
It is a challenge for companies to balance the need for technology with the elements of privacy and security. Let's analyze some ethical issues, such as information security, balancing the privacy of employees with the need for monitoring employees, file sharing, and copyright infringement.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the UExcel Business Information Systems: Study Guide & Test Prep course
- Introduction to Business Information Systems
- Computer-Based Information System Components
- Information Systems Application & Impact
- Information Systems Hardware
- Information Systems Software Programs
- Information Systems Software Applications
- Data Management in Information Systems
- Networking & Systems Technology
- Internet, Intranet, & Extranet
- Virtualization for Business
- Electronic & Mobile Commerce
- Enterprise Systems for Business
- Decision Making & Specialized Information Systems
- Systems Development Components & Lifecycle
- UExcel Business Information Systems Flashcards