Being Human: Human-Computer Interaction

Computers are everywhere. Computers already pervaded the homes and offices of many industrialised countries. Computers used to be considered as mere machines, tools to help man become more efficient. A complex machine that is a great help when it comes to processing a considerable amount of data. Computers can be programmed to help manage a factory, an office or laboratory.

But those days are gone. Today computers are human-like with the capability to work tirelessly and unceasingly without the direct supervision of humans. This has prompted many to raise the question if living with technology can make us feel happier or will technology make us more tiresome, frustrated, angst-ridden, and security driven and what will it mean to be human when everything we do is supported or augmented by technology?1

Digital technology should be a force for good but ignorance of its functions and capabilities can cause security problems and make life extremely difficult for vicitims of identity theft. It is therefore important not only to appreciate the impact of Information Technology but also to be aware of its different consequences such as digital footprints.

Being Human

Man has gone from primitive to technical sophistication in just a very short time. In the latter part of the 20th century, his understanding of machines, electricity, microprocessors, and computer programming has improved tremendously to the point that it is already a cause for concern.

There seems to be no limit to his ability to create new technologies that purportedly aims to make life better. However, this argument has become debatable in recent years as more and more people have become alarmed with the negative impact of some highly advanced technologies. The power and pervasiveness of computers can be seen as a double-edged sword, meaning it is both beneficial and harmful at the same time.

Our Changing World

There are those who believe that technological advancement is beneficial and the predictable consequence of human development. The benefits come in multiple packages such as healthier lifestyles, expansion of creative skills with digital tools, and instant access to information never available beforehand.2

Every area and every sector of society has been affected by technology. Technological innovations in business, especially in supply chain management created significant changes in this field of endeavor. It is now possible for businessmen, corporate leaders and employees to work faster, at a more efficient rate than ever before. It is also the reason why competition is at an all time high but overall it helps in creating a more productive business environment. The root cause for all of these innovations can be categorized into two: computer systems and the Internet.

Being human compels scientists to leverage technology to change lives. This can mean different things. First of all, technology has transformed the way people study and learn. Researchers from Microsoft were able to describe this paradigm shift succinctly by stating, the way teachers and professors engage with their students in class (e.g. use of online assessment tools to provide feedback and reports) is very different from the chalk and talk model of the past.3

Aside from learning changing lives also means the capability to save lives in a search and rescue situation. There is not enough space to discuss fatalities and mishaps that occur in many search and rescue operations because the operators could not see through the smoke, fog and even in heavy rains. Technology is changing all of that in favour of humans.

Being human means the necessity of finding ways to improve the quality of life. This can be seen in the creation of social networks. Aside from increasing interaction and making new friends through the World-Wide-Web new technologies are being used to monitor the activities of loved ones. When it comes to the elderly, technology makes it possible for them to remain active even in their twilight years.

Transformation in Interactions

In 2020 the human race will not only witness the rapid development in computer technology in terms of storage capacity and processing power but also in the radical evolution of computer-human interactions. Ten years from now people should expect the end of interface stability and the growth of techno-dependency.4

There is also the need to be ready when it comes to the consequences caused by the growth of hyper-connectivity and the growth of creative engagements.5 Today computer use is characterized by having a monitor in front of the user but ten years from now graphical user interface can easily become a secondary method for man to connect with machines and computers.

Ten years from now the phenomenon called human-computer interaction is no longer limited to user touching buttons on mobile phones or interactive monitors. This is made possible by wearable technology such as the electronic sensing jewelry developed by Philips Design that has prompted experts to remark: the boundary between us and machines and the extent to which it is visible to us is now no longer as clear as when we interacted at the desktop or the terminal.6 Ten years from now technology does not only come in smaller packages but can be also embedded within the human body.

HCI: Looking Forward

Although the rapid technological breakthroughs seem to occur at breakneck speed, it can be argued that the development of technology follows a certain pattern. This simply means that a particular technology is the by-product of discoveries made in the past and that scientist and inventors were merely in the right place and the right time to have the insight to develop solutions to problems, software and even electronic devices that enabled them to create something new.

This pattern of change is the same reason why one can fairly predict what will happen in the future. For example, there is a trend when it comes to developing smaller and yet powerful mobile phones. Tracing this pattern will reveal that in the future phones thinner and more sophisticated than an iPhone will be able to the public in the next few years or even in the next 6 months.

If one will apply the same technique in predicting technological advances in the near future the result would be something that can excite and terrify at the same time. It has resulted in the emergence of at least three groups of people. The first group are composed of those who believe that technological breakthroughs must keep on coming because mans survival depended on it. However, there is a high probability that computers can bring harm to families and individuals as well.

The second group are those who are thankful for technology but has shown concern with regards to some of its more obvious negative consequences such as the loss of privacy, the loss of jobs due to mechanization of labour, and the weakening of human-to-human interaction as face-to-face communication has now been replaced with various wireless human-computer interaction.

The third group is comprised of those who are totally unconvinced that rapid technological improvements in the field of business, transportation, healthcare, agriculture, entertainment, and research can significantly improve the quality of life. These three groups of people will further tackle divisive issues now that technology has evolved from electrical-mechanical to digital technology.

It is therefore important to look into the link between technology and human values. Technology can be misused or abused and in some cases people can offend others by simply ignoring cultural differences. It has to be made clear that computers are not neutral and therefore it can be used in ways overlooked by designers and programmers. Thus, there is a clamour to extend the research and design cycle and add another stage which is entails conceptual analysis.7 This will ensure that designers are able to anticipate the full implications of releasing a new type of technology into the world.

Digital Footprints

UKs Parliamentary Office of Science and Technology revealed that, A carbon footprint is the total amount of CO2 and other greenhouse gases, emitted over the full life cycle of a process or product. It is expressed as grams of CO2 equivalent per kilowatt hour of generation (gCO2eq/kWh), which accounts for the different global warming effects of greenhouse gases.8 The concept labelled captured the imagination of many people because of two reasons.

First, there is now a way to understand the extent of human culpability when it comes to climate change. Secondly, there is a way to measure carbon emissions through the burning of fossil fuels. This ability to track down and monitor a citys carbon footprint also provides the framework to make people accountable for actions that are viewed as detrimental to the environment.

The revolutionary concept known as carbon footprint is an inspiration to those who tried to comprehend and deal with the proliferation of personal information in cyberspace with the real owners unaware that a total stranger can study their habits and tendencies without having to see them face-to-face.

Decreasing Cost and Increasing Capacity of Digital Storage

Today, the principle behind the tracking and monitoring of something as omnipresent  and yet at the same time undetected by human senses  as carbon dioxide gas, is now used to label a phenomenon in cyberspace. It is not physical but digital and therefore aptly labelled as digital footprint.

According to research analysts at Microsoft, huge amounts of information are being recorded and stored daily about peoples behaviour, as they walk through the streets, drive their cars and use the Web& while much of this may be erased after a period of time, some is stored more permanently, about which people may be naively unaware.9 Digital footprints are generated each time a person uses a social networking site and post comments and pictures on it. A close-circuit camera can record human activities and store it in a security firms database etc. This is another way to generate digital footprints.

Before digital footprints became a major issue the main problem is all about the lack of storage space and therefore limitations when it comes to the need to record important information.

Nowadays, the problem is not the capability to record voluminous data but how to manage it and at the same time destroy it when it is no longer practical to keep it hidden in computer hardware or stored in a database somewhere in the world. However, it was discovered that in the 21st century it is easy to leave digital footprints but difficult to remove it from a system as vast and interconnected as the World-Wide-Web.

According to one commentary on digital footprints, The big difference between paper and digital trails is that the tracks left in cyberspace are extremely difficult to destroy& written, photographic, audio, or video content of any kind abut a person that finds its way into cyberspace forms that persons digital footprints and unlike footprints in the sand, a digital footprint cannot simply be washed away.10 This is a problematic issue based on theft-identity and the prevalence of bullying on the Internet.

The existence of a digital footprint has two major implications. First of all computer users may not give a thought to where their digital information are stored and who can access it. Thus, there are users who will post pictures, comments, and other personal information without considering the fact this digital footprint can be stored forever in a database somewhere.

It is possible that a teenager who posted something embarrassing in a social networking site the action could never be erased and accessible 24 hours a day and seven days a week. Secondly, the digital footprint left in cyberspace may contain something more valuable than an embarrassing photo, it can be personal information that unscrupulous people can use to victimize the naïve.

A recent survey asking employers their strategies on hiring people revealed something that should make everyone extra careful when visiting websites.

Researchers from a popular job site inimated that 26 percent of hiring mangers said they had checked a job seekers digital footprint and of the hiring managers who admitted making these checks, 63 percent said they found something that made them decide not to offer a job to an applicant.11 There should be a follow-up question but unfortunately the same researchers did not elaborate on what the hiring managers found that made them decide not to hire these people.

Before the advent of the Internet and powerful computer systems there is a simple way of managing data. It is filed and kept in secure storage only accessible to those who have the correct set of keys or combination to a safe. Information that may prove scandalous and carry the risk of tarnishing the image of celebrity, businessman or politician can be sent to the shredder. For those who are paranoid with security and confidentiality documents and photographs can be burned. There would be no evidence or any trail left behind. In the Age of Information this can never be the case.

In a digital world, statements posted in a website and the photographs submitted to an online site can be downloaded and copied without permission. The same data can be reproduced, passed on to others and other people can post it to other websites and the cycle goes on and on until a particular data is already multiplied several times in cyberspace. But the most problematic thing about it is that there is a great possibility that an embarrassing photo can remain inside a database for decades to come and it can be stumbled upon many years from now.

A digital footprint can also be understood as some form of a floating curriculum vitae that is floating around and anyone can grab it, study, manipulate and use to defame or blackmail someone. The problem is that the digital footprint is comparable to a fingerprint; it has plenty of information that links it to a real person.

It does not matter if someone hacked into a particular system and assumed the identity of another person; the more important thing is the fact that the digital footprint left behind can be an incriminating evidence that can destroy the reputation of an individual. In the past there is a way to escape negative criticism and there is a proven strategy to overhaul a bad reputation and most of the time it simply requires a suitcase and a one-way ticket out of town. But nowadays the only safe place to hide is an island without computers and Internet.

Digital footprints are also created through the implementation of government mandated security procedures. The idea that the government can spy on people is nothing new but in recent years, technological advancements in monitoring human activities has elevated the discussion into a whole new level. Consider for example what IT experts are saying regarding this subject matter:

Identity cards and passports have increasing amounts of digital information embedded in them that can be read at passport controls. Opinions about what information

governments need and ought to have, and what citizens ought reasonably to provide are changing. In many ways, technology is making the relationship between government and the individual more complex, not least because it is often difficult to know how much information is being gathered, how it is being used, and who has control of it.12

The concern with regards to the degree of digital footprint that can be left behind comes in the wake of increasing human-computer interaction. Part of the reason is the reality that more and more people are living in a networked society. According to experts there is now a higher interconnection of networks and systems between individuals and organizations.13

In the words of one IT practitioner, the 21st century is characterized by the migration from accepted systems and procedures (commercial, administrative, technical) to new ones (electronic commerce, digital cash, tele-working, electronic mail) and it is increasingly difficult to live outside the grid of digital networks.14

Global interaction as well as the use of new technology is fuelling the desire to transmit information through the World-Wide-Web. It is time to consider the consequences of creating digital footprints. Policy makers must look into this issue and develop strategies as well as ratify laws to mitigate the impact of unauthorized access to a persons digital footprints.

Conclusion

The rapid development of technology is both a blessing and a curse depending from which perspective it is viewed. The quality of life is greatly enhanced but on the other hand threat to security abound especially when it comes to the phenomenon called digital footprints. There is no way to reverse the evolution of human-computer interaction and the best way to deal with it is to simply upgrade or extend the development cycle.

There is a need to add one more step and it is to give room for conceptual analysis so that developers, programmers, IT experts, government officials and interest groups will have a clear idea of the future implications of a new technology before it can be accessed by the general public.

Bibliography

Baldwin, S, Carbon footprint of electricity generation. UKs Parliamentary Office of Science and Technology, 2006. Web.

Dowland, P. et al, Security management, integrity, and internal control in information systems. New York: Springer Science, 2005.

Grayson, R, Managing your digital footprint. New York: Rosen Publishing Group, Inc., 2011.

Harper, R et al., Being human: human-computer interaction in the year 2020.

Microsoft Research Ltd., Cambridge, 2008.

Pathak, J, Information technology auditing: an evolving agenda. Springer, New York, 2005.

Footnotes

  1. R Harper et al, Being human: human-computer interaction in the year 2020. Microsoft Research Ltd., Cambridge, 2008, p.10.
  2. Harper, p.11.
  3. Harper, p.25.
  4. Harper, p.34.
  5. Harper, p.35.
  6. Harper, p.36.
  7. Harper, p.59.
  8. Baldwin, S, Carbon footprint of electricity generation. UKs Parliamentary Office of Science and Technology, 2006. Web.
  9. Harper, p.21.
  10. Grayson, R, Managing your digital footprint. New York: Rosen Publishing Group, Inc., 2011.
  11. Grayson, p.9.
  12. Harper, p.29.
  13. P Dowland et al., Security management, integrity, and internal control in information systems. New York: Springer Science, 2005, p.262.
  14. J Pathak, Information technology auditing: an evolving agenda. Springer, New York, 2005, p.107.

Momenta Pentop Computers Design and Technology

Introduction

Momenta Corporation was known as the first company that developed the design of a tablet computer. Known as a pen top  a touch-sensitive tablet computer operated by means of a pen  it was a revolutionary and innovative technology at the beginning of the 1990s. Nevertheless, regardless of the new design and a promising future, the company has become a failure, even though the proposed technology has become the foundation for modern tablets, including iPads  the first tablets manufactured based on the Momentas ideas. Due to the significant influence of the company on the development of the tablet industry, it is essential to study the specificities of the product design (technology assessment) as well as understand major human factors and system limitations that led the corporation to failure.

Technology Assessment

System diagram

The Momenta pentop computer contains several parts  a screen, a pen, and a keyboard. They are connected with wires. The screen is a transflective monochrome device with an option of flip-upping and a 10-inch diagonal axis. Another element is a detachable keyboard for typing in texts and developing spreadsheets. A tethered pen is the last element of the pentop computer. Its specificity is a relatively wide variety of functions and options, including a pen-based word processor, extensions and applications for the pen, and different communication and spreadsheet options. At the same time, the pen can eliminate the limitations of the multi-touch screens, as it can be used for completing information-related operations and controlling the computer. In this way, both pen and keyboard can be deployed for improving user experience and boosting the tablets performance (Momenta Corporation 1/40 Pentop Computer). See Figure 1 below for getting acquainted with the technological details of the pentop computer.

Momenta pentop computer (Momenta Corporation 1/40 Pentop Computer)
Figure 1. Momenta pentop computer (Momenta Corporation 1/40 Pentop Computer)

Human Factors Analysis

For completing the human factor analysis, it is essential to pay special attention to everyone interested in the design and operation of the new product. In the case of the Momenta pentop computer, the assessment will cover three groups of people associated with the product  designers, manufacturers, management, and users.

Designers

Even though the design demonstrated above was a novelty as for the beginning of the 1990s, the industry-wide breakthrough had not occurred due to several gaps ignored by designers. It is evident that the tethered pen was potentially connected to some technical and comfort issues. For instance, making it detachable (like the keyboard) might have helped to minimize the risks of problems caused by wire breakage. At the same time, the very combination of both keyboard and pen in one device is questionable. From this perspective, the functionality of the pen is initially dubious. It means that if the pen worked accurately and relevantly, there would have been no need for offering the keyboard as a component initially provided with the computer, not one purchased for making its operation more efficient or comfortable. Finally, the wiring system is too complicated for the comfortable use of the device, i.e. locating portholes for different components (pen, keyboard, and charger) on three different sides leads to comfort-related issues.

Nevertheless, there are as well some strengths of the product design. For instance, the keyboard and tablet are of nearly the same size that makes carrying the device easier. Furthermore, an opportunity to detach the keyboard is as well beneficial, especially in cases when it is unnecessary or during transportation and carrying the pentop computer.

Manufacturers

In addition to the identified design gaps, manufacturers were as well responsible for the failure of the pentop computer. Even though they used resources available at the market, the hardware was poorly manufactured. The major drawback is a short battery life that means that manufacturers ignored the criticality of searching alternatives for making it longer (for instance, using more energy-saving materials for producing the computer). Moreover, there were issues with a sensitive-touch screen (poor handwriting recognition) that as well points to the fact that manufacturers either failed to find the best materials for their product or could not develop the product properly.

Management

The companys senior management (including a chief executive officer) paid special attention to PR and marketing instead of improving the design and functions of the product. Therefore, the product was overpriced, and the price-quality ratio was lower than expected. Moreover, senior management ignored the requirements of the market. It means that even though the product was revolutionary, it was too innovative. From this perspective, the market was not ready for accepting it and satisfying the companys supply needs, i.e. purchasing all products manufactured and offered by the corporation (Einstein).

Users

Even though the design of the new product was innovative and promising, it was not intuitive. It means that it was not available to an ordinary customer. Therefore, a user had to possess particular skills and knowledge in order to operate the machine effectively and maximize its benefits. In addition, most consumers were forced to use a keyboard to type in texts because handwriting options were poorly developed so that there were numerous misprints when people put in information by means of the offered pen. At the same time, the users had to pay special attention to recharging batteries often due to short battery life so that the computer worked while completing important tasks. All in all, regardless of the forward-thinking product design, there was much work left to the user, including the necessity to study how to operate the sensitive-touch device before purchasing it.

System Limitations

Regardless of the revolutionary approach to designing the pentop computer, the system as a whole was a failure. In this case, it is essential to point to the fact that it was the combination of factors that played false with the corporation. The primary system limitations were implicitly identified in the human factor analysis above. Still, they should be indicated directly. To begin with, even though the tablet was underpowered, at the same time, it was overpriced. In this case, attention should be paid to both battery life and technological gaps combined with inefficient management strategies. From this perspective, due to the limited technology development (overall technological issues in the industry), handwriting recognition software was operating poorly. More than that, it pointed to significant screen-related issues, i.e. inadequate sensitive-touch options (What Is the Chasm and How Do You Cross It?). All in all, the major limitations were associated with ignoring the readiness of the market to accept the product. It means that it might have been possible to avoid system limitations if the company operated in the field of technology that has been already approved and used by ordinary customers, i.e. did not require them to obtain new knowledge in order to enjoy the new product (Moore).

Works Cited

Einstein, David A. The Magic of Failure. SFGate, 1998, Web.

Momenta Corporation 1/40 Pentop Computer. RICM, 1991, Web.

Moore, Geoffrey O. Crossing the Chasm: Marketing and Selling Disruptive Products to Mainstream Customers. 3rd ed., HarperBusiness, 2014. Google Books.

What Is the Chasm and How Do You Cross It? Product Strategy, 2008, Web.

Computer Law and Information Security

Computer law is increasingly becoming an important area in the fields of legal as well as information technology (IT). Computer law affects corporations and professionals positively and negatively, but the advantages of effective and strict computer laws are important in ensuring the security of the computer systems, data, individuals, and organizations (Whitman & Mattord, 2012).

In the US, statutes and case laws are used to decriminalize or criminalize various activities involving the use of computer systems and information. The computer Fraud and Abuse Act (CFAA) is the statute with the broadest impact on information technology and management. Enacted in 1986, the statute aims at criminalizing the hacking of computer systems (Whitman & Mattord, 2012). However, it has undergone several amendments such as the National Information Infrastructure Protection Act (1994), the Patriotic Act (2001), and the Patriot Improvement and Reauthorization Act (2006). These statutes affect individuals and companies in a positive manner. It protects professionals in information technology from hacking, which might lead to destruction, loss, or leakage of information. In addition, it helps organizations to maintain the integrity of their information, including business secrets and other crucial information required in management (Harrington, 2009).

In the US, the Privacy Act of 1974 is an example of some of the most effective legislation that affects professionals and organizations. According to this statute, government agencies must show individuals the information recorded about them. Secondly, agencies must follow fair information practices when they are gathering and handling information about individuals (Whitman & Mattord, 2012). Thirdly, it ensures that restrictions are placed on the processes of sharing data of an individual between or within organizations, finally, it allows individuals and organizations to sue the authorities if their rights to information protection are violated (Harrington, 2009).

The Electronic Communication Privacy Act (1986) seeks to regulate communications through the mouth (oral), wire, and electronic methods. It affects professionals and organizations because it criminalizes forceful and unwarranted seizure and search of information in computer systems (Harrington, 2009). Therefore, it protects the integrity and privacy of information systems for IT professionals and organizations.

Case laws also play an important role in regulating information technology and computer systems. For instance, the ACLU v Zell Miller establishes the right to privacy for the users of internet technology. In addition, it guarantees the basic rights of organizations and individuals using internet technology (Harrington, 2009).

The Bourke v. Nissan Motor Corp establishes the right of organizations to monitor the emails of their employees or terminate an employees use of personal or sexual information through the companys computer system. It affects organizations in a positive manner, but it may have negative impacts on professionals within an organization because they do not have the privacy of their communication.

To improve personal privacy, a number of approaches are applicable. For instance, the use of authorization systems such as a unique user login and password are important approaches. They help individuals and companies protect personal information because unauthorized individuals cannot access information. However, they have disadvantages such as loss of crucial information when the user forgets the authentication details or dies or leave the company without disclosing the information to another part (Whitman & Mattord, 2012).

Digital signature legislations are important in the protection of the digital signatures when developing and signing contracts through electronic media. They protect the authenticity of documents and digital messages. They ensure that the privacy of software, financial and other records are protected when under electronic transaction.

References

Harrington, S. J. (2009). The Effects of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgment and Intentions. MIS Quarterly 20(3), 257-278.

Whitman, M., & Mattord, H. (2012). Readings & Cases in Information Security: Law & Ethics. Mason, OH: Cengage.

Computer-Assisted Language Learning and E-Learning

Introduction

Computer-assisted language learning (CALL) can be loosely be described as the process of providing language skills to learners by means of computers or computer applications. CALL is a divergent field that encompasses various levels of learning, all supported by computer-enabled technology (Kukulska-Hulme and Lesley 271). Today, computer-assisted learning is inclusive of E-Learning and Mobile learning, where language learning is done online and knowledge disseminated using mobile devices such as tablets and smartphones.

Computer-assisted learning

Many educators hold that CALL has significant advantages over traditional methods of second language learning. Among these include the fact that it provides second language learners with independence from classrooms, allowing them flexible and convenient learning. In addition, while the hardware and software needed for the learning may appear expensive at the onset, as they are gradually implemented, the economies of scale ultimately make them cheaper (Beatty 7).

Using computers in class also provides learners and teachers with a chance to widen their scope of practice. For example, instead of reading a story to his or her class, a teacher can have them watch and discuss an animated version of the same displayed on a projector. Nevertheless, it should not be assumed that CALL programs are meant to replace human teachers because, on the contrary, they only supplement and boost their effectiveness (Lai and William 2). For example, when a student can use a software application to work on their pronunciation, the teacher will have extra time to focus on the more intricate aspects of grammar that cannot be taught using computers.

ELearning

E Learning is a critical aspect of contemporary language learning since many youths spend most of their time socializing and playing games online. Therefore, when they are provided with an avenue through which to use the already familiar online space for studying, it is easy to motivate them. Using online portals and interactive websites, learners can interact with their peers and engage in virtual discussions and competitions (Lia and William 3).

In addition, E-learning allows them to access material produced by native language speakers, which is instrumental in boosting their language acquisition. Thousands of online applications and websites provide affordable or even free language training. These are designed creatively in the form of games and other interactive fun activities that make language learning an enjoyable experience. E Learning also provides a wide range of opportunities for students to practice their skills and engage in experimental and interactive learning. Furthermore, given the versatility of online space, new information and tools are quickly updated to improve the overall learning experience.

Mobile learning

Considering Given the amount of time, many teenagers and young adults spend on their smartphones and tablets, using these tools as a platform to teach language skills is highly effective (Kukulska-Hulme and Lesley 271). Most of the applications used to access online learning can be rendered on mobile devices, which are more common than computers. They allow students and teachers to reach new levels of interaction since communication can occur remotely and on a flexible schedule as majority leaners keep their gadgets close to them.

They are using the media to teach language

The above-mentioned tools of learning constitute the contemporary environment for language learning in which various media are to teach language without direct contact with a teacher. Retrospectively, these media usually consisted of newspapers or TV and radio shows, however, today there are much more personalized and effective technologies. Most of them are based on the web, and in addition to specialized language websites, there are also social networking using sites like Facebook and Twitter. As a result, language learning has considerably improved, especially in view of the fact that, there are numerous readily available technologies to support the process.

Works Cited

Beatty, Ken. Teaching & researching: Computer-assisted language learning. Routledge, 2013. Print.

Kukulska-Hulme, Agnes, and Lesley Shield. An overview of mobile assisted language learning: From content delivery to supported collaboration and interaction. ReCALL 20.03 (2008): 271-289. Print.

Lai, Cheng-Chieh, and William Allan Kritsonis. The Advantages and Disadvantages of Computer Technology in Second Language Acquisition.Online Submission 3.1 (2006). Print.

ABC Healthcare Cyber and Computer Network Security

Describe your technical recommendations to address the security requirements in the overall technical design of the ABC Healthcare network

The detailed response below includes both internal and external aspects of security requirements. It includes both untrusted and trusted aspects of the requirements. Untrusted security requirements will include user connectivity to the internet. The trusted aspect of the network plays a major role in supporting the business functions of known entities. The known entities, in this case, include such stakeholders as partners, suppliers, and customers. All of these stakeholders have a specific business relationship with the company.

It is important to note that the overall design of the ABC Healthcare network is very broad. In addition, technical solutions aimed at addressing the security of computer networks are numerous. A given organization has a wide variety of solutions to choose from. However, it is essential to note that before embarking on technical solutions for the identified problems, users of ABC Healthcare computer network should know their roles. Different users have different roles to play as far as the security measures are concerned. Their role in the security system reflects, to some extent, their role in the overall organizational structure. To this end, end-users, such as employees, have different roles compared to the developers of the system. It is also important to note that approximately 10% of the security requirements in any given organization are technical in nature. What this means is that this 10 percent needs to be handled by individuals who have the necessary skills to handle online security. The remaining 90% of security requirements for the network rely on the users. As such, the users have a very critical role to play in network security. In this case, the users include mainstream employees, customers, suppliers, and others. The users enhance security by, among others, adhering to proper computing practices. Such computing practices include safeguarding the passwords required to access the network and using the network resources responsibly.

As already indicated above, some aspects of network security are untrusted. With regards to ABC Healthcare network, this level poses the greatest risk to the organization. In essence, external stakeholders, such as suppliers and customers, pose the biggest threat to the security of the companys network resources. As such, it is important to secure this network. The first step towards securing the network involves the elimination of, among others, physical vulnerabilities. Such vulnerabilities are brought about by physical applications used by the network, such as computers. To this end, physical communication media, such as servers and routers, should be located in secure locations. The servers should not be physically accessible to unauthorized parties. The areas where these physical media are located should have restricted access. In addition, such acts of God as earthquakes, lightning, floods, and mudslides should be put into consideration. The media should be secured such that it remains steady even when under assault from the elements. In addition, the media should be located away from areas prone to these calamities.

There are other features that should be put into consideration at the untrusted network level. Such features include enhancing the security and confidentiality of information relayed over the network. The need for passwords and such other codes comes in at this juncture. Confidentiality entails the encryption of data transmitted over the insecure network. The data is encrypted in such a way that it cannot be accessed by unauthorized parties. Another feature is the integrity of the information, which should be upheld at all times. Integrity involves identifying and dealing with any signs of alteration during transit.

There are a number of hardware components that can be used to secure the companys network. For example, network firewalls are some of the major hardware components to use when securing ABC Network. The hardware is used to safeguard ABC Network from invasions carried out from other external networks. Cisco firewall hardware equipment would be essential for the protection of this level. However, it is important to note that firewall hardware has a number of inherent limitations. For example, such hardware only reduces the risk of intrusion. As such, there is a need for the inclusion of corresponding firewall software, such as Internet Security Systems BlackICE PC Protection. The software-based firewalls should be installed on individual computers used in the organization. When combined with the hardware component, software firewalls will minimize the risk of intrusion from external networks, such as the internet.

Screening routers can also be used to secure the network. The screening procedure facilitates effective protection of the internal or local area networks (LANs) from internet attacks. Routers are important as they are needed to establish a connection to the internet. As such, additional security configurations in such systems would be very important. The normal routers used in the organization can be transformed into screening routers. Such a transformation can be achieved through the installation of the Drawbridge software. As such, the use of Drawbridge will enhance the security of the ABS Health network.

It is a fact that the use of screening and firewalls can almost eliminate all the risks associated with the internet network. However, it is important to note that the sensitive nature of the information held by ABS Healthcare calls for much more. One such additional measure is restricting users access to the internet. Such a measure will make the system much secure.

In addition, installing such software programs as SmartFilter would regulate the internal users of the ABC Healthcare computers. The users will be prevented from accessing particular websites on the internet. The filter restricts access to a number of websites that are regarded as high risk. For example, some of these websites, such as pornographic sites, increase the vulnerability of the ABC Healthcare network. The vulnerability is increased through the introduction of viruses from the internet via these sites.

The operations of ABC Healthcare require the organization to interact with a number of trusted networks. Such interactions involve stakeholders like suppliers and customers. The organization may interact with the suppliers via the network by placing orders. It may also engage potential and existing customers through correspondence. However, it is important to note some of such interactions with the stakeholders are carried out over the unsecured network. Such interactions expose ABC Healthcare network to a myriad of security risks. It is important to address this problem in order to enhance the security of the network. The solution is not curtailing the interaction between the organization and the stakeholders, given that such engagements are crucial to the operations of this firm. However, the introduction of Virtual Private Networks (VPNs) significantly eliminates this risk. The network refers to a particular mode of transmitting data securely over an unsecured network.

A number of strategies can be adopted to integrate Virtual Private Networks into the ABC Healthcare network. One of the strategies includes a combination of various encryptions, tunneling, and authentication techniques. Such measures call for the introduction of various protocols into ABCs Healthcare network. There are a number of protocols commonly used in Virtual Private Networks. They include Point-Point-Tunneling Protocol (PPTP) and SOCKS protocol. Others include Layer 2 Tunneling Protocol (L2TP) and Internet Protocol Security (IPSec). The suggested Virtual Private Network needs to be implemented through server-to-server configuration. To this end, the servers used by ABC Healthcare network are configured with those used by the stakeholders with the help of the various VPN protocols. Such a configuration will effectively enhance network security in the organization.

There are other strategies used to safeguard computers from both internal and external intrusion. One of the major strategies commonly applied to achieve this involves the use of Anti-Virus software. To this end, ABC Healthcare can invest in such software to protect its network against external intrusion from the internet and internal intrusion from the users. However, such a measure calls for an effective and updated version of Anti-Virus software. If this is not ensured, such efforts go to waste.

Internal and remote users of the ABC Healthcare computer network can easily expose the system to a number of risks. They can do this by introducing viruses or worms into the system through media accessories. Such media as flash disks, compact disks among others can be used to transmit these malicious soft wares. The transmission can either be deliberate or unintended. Whichever the case, the security of the network should be enhanced. Up-to-date Anti-Virus software can easily address this problem. The software can be used to scan these media and eliminate any malicious software in them before they are used in the system. The action would take place with or without the intent of the users.

The measures proposed above for safeguarding and improving the security of ABC Healthcare network will ultimately enhance the effectiveness of the system. However, the proposed measures will require the company to update its computer networks on a regular basis. New threats to computer network security emerge every day. As such, the importance of updating the networks security systems cannot be underestimated.

Discuss the way you will address requirements for system monitoring, logging, and auditing, including complying with any legal regulations

Any organization operating in contemporary society is required to adhere to a number of rules and regulations in its operations. Compliance with these rules and regulations remains a major issue in these organizations. ABC Healthcare is no exception. The organization does not operate in a vacuum. Rather, its operations have to comply with a myriad of procedural guidelines put in place. For example, the company needs to comply with, among others, the Sarbanes-Oxley (SOX) regulations and the provisions of the Health Insurance Portability and Accountability Act (HIPAA). Organizational survival in any given industry is partly determined by adherence to the various regulations.

Logging focuses on the information collected and recorded by the IT systems. Such information gives rise to records known as logs. Logs result from information that is generated by monitoring activities conducted over the IT systems. Such logged information needs to be reported. Reporting entails the presentation of the information in a specified format for regulatory purposes. The information is used by developers and regulators or the system to determine whether any security threats are evident.

There is a need to adhere to the regulatory requirements of logging, monitoring, and reporting. The need for adherence gives rise to major issues. The organization needs to come up with a number of control measures for logging, monitoring and reporting. Such measures are very important since the information held by the ABC Healthcare system is very sensitive. Access protocols would greatly facilitate logging, monitoring, and auditing purposes.

Information touching on logging and monitoring is collected from a wide range of ABC Healthcare system users. The users include employees, managers, and suppliers. What this means is that the various stakeholders cannot be regulated at the initial phase of entering the information into the system. As such, the need for central servers for the storage of the information collected becomes apparent. The servers would then be backed up in various locations. Back-up is a security measure put in place to ensure that the information in the servers is not lost in case of any unforeseen eventualities. Consequently, the privacy of information is upheld by requesting users to authenticate their details before they can access the databases.

There is a need to formulate additional policies to regulate the collection of information and regulate access to ABC Healthcare databases. The policies will regulate the actions of both internal and external users. The regulation will greatly enhance compliance requirements.

Describe how the system will identify and authenticate all the users who attempt to access ABC Healthcare information resources

Accessing the information contained in ABC Healthcare network systems is a very sensitive issue. As already indicated, the information contained in this system is very sensitive. It touches on, among others, the health status of the patients, which should be treated with the utmost confidentiality. Access by unauthenticated users of the system, as well as misuse of the accessed information resources, can jeopardize the operations of ABC Healthcare network systems. Therefore, a combination of authentication mechanisms would be very effective.

There are various basic user-authentication measures that can be used to enhance system security. Such measures include, among others, the use of usernames and passwords to access information in the database. Such measures, however, would be for low-level information, which is not very sensitive. Such information can be accessed by middle and lower-level system users. For the more sensitive information, biometric measures would be used to authenticate users accessing the resources.

Biometric measures fall into two major categories. The first is physical characteristic recognition (PCR). The second is behavioral characteristic recognition (BCR). Both categories are very essential in the identification and authentication of users. However, the suitable category of biometric measure to apply in ABC Healthcare would be PCR. PCR would rely on the physical characteristics of the users seeking access to the organizations information resources. The physical characteristics entail scanning the retina or the iris. It also involves a fingerprint scan, facial geometry, and voiceprint identification and authentication. The PCR system is almost incorruptible, except for hardware or database failures.

Discuss how the system will recover from attacks, failures, and accidents

Attacks, failures, and accidents are bound to affect ABC Healthcare network. The eventualities are likely to occur in spite of the measures taken to safeguard the system. Therefore, planning and incorporating recovery mechanisms into the system in case of any failures is very essential. A combination of recovery strategies would be more effective in the case of the ABC Healthcare network. The first recovery mechanism includes making sure that recovery and backup servers are independently located from the main servers of the network.

Backup servers ensure that in case of any failure or attack, the operations of the ABC Healthcare network can go on uninterrupted. Their capacity to achieve this may be limited. However, their functionality can be sustained until the main network system resumes service.

The recovery method is the best choice for the system. It allows for time to troubleshoot the main network without halting the operations of the healthcare center. In addition, the likelihood of the main networking and backup systems succumbing to attacks or other forms of failure at the same time is reduced.

Discuss how the system will address user account management and related security improvements

User account management, as outlined earlier, falls under regulation. The management depends on the informations level of sensitivity. System user policies developed under these security management upgrades would be fully implemented. However, all users of the system must have access credentials, including usernames and passwords. Every time a user accesses the network, the system would record their credentials. Furthermore, records of the information accessed and the duration of time spent logged into the system are archived.

A number of system administrators will share responsibility with regard to the maintenance of the network system. The administrators will be under the supervision of top-level managers and selected auditors. A combination of various security codes will be shared between the group members to curb sabotage. The teams main task includes twenty-four-hour surveillance of the networks hardware and software components. The surveillance function will also be automated.

Security in the Computer Networking World

Ensuring security in computer networks is a significant issue that requires careful analytical work and utilizing relevant mechanisms to counter the threats of hacking and data theft. The transition to a digital standard for storing valuable documentation necessitates the organization of reliable and stably operating systems with authorization functions, protection against cyberattacks, and other beneficial properties. In order to consider the basic principles of ensuring the security of computer networks and their proper maintenance, it is essential to evaluate the existing tools created for these purposes.

This work is aimed at describing approaches to enhancing online security, in particular, installing firewalls and network hardening. Each of these stages is in terms of value in the context of virtual security and may be applied to both local and international networks to prevent computer engineers attacks and other threats. As a substantiation base, relevant peer-reviewed academic sources will be used to confirm specific hypotheses and analyze findings. The high-quality and comprehensive security of computer networks, which is carried out with the help of modern protection mechanisms, is the guarantee of the safety of valuable data and theft prevention.

Social Engineering as a Security Threat

Social engineering is the method of unauthorized access to information or storage systems without using technical means. According to Thakur, Shan, and Pathan (2018), this principle is considered to be one of the most overwhelming threats in the field of cybersecurity (p. 19). Social engineering is based on using the weaknesses of the human factor and is an effective way of introducing into closed computer networks.

Attackers obtain information, for instance, by collecting data about employees, applying for regular phone calls, or by entering the organization under the guise of its employee. Utilizing such a principle of data theft is most relevant when hackers choose a specific company or firm as the target of an attack. Existing social engineering techniques allow intruders to choose optimal tactics.

Social Engineering Techniques

All the techniques applied in social engineering are based on the characteristics of peoples decision-making. For instance, pretexting is the method developed according to a predetermined scenario, as a result of which a victim provides certain information or performs a specific action. This type of attack is usually utilized by telephone, and most often, this crime involves not only lies but also some preliminary research, such as personalization. By acting in this way, attackers can assure themselves of their goals. Another common technique is phishing, the method aimed at obtaining confidential information fraudulently.

Thakur et al. (2018) cite an example when an attacker sends a targeted e-mail forged under an official letter and requiring the verification of specific information or the commission of some actions. This letter may contain a link to a fake web page imitating an official one with a corporate logo and content and offering a form that requires entering confidential information. These types of threats to computer networks are common and require applying for appropriate preventive measures.

Methods of Prevention

The primary way of protecting against social engineering is learning the rules of corporate behavior. Lakshmi and Gireesh (2019) argue that all the employees of a particular company should be aware of the risk of information disclosure. Moreover, workers are to have clear instructions on how and on what topics they should discuss with their interlocutors and what information they need to obtain for accurate authentication.

Since all user passwords are proprietary, employees should realize that those access data that they are given cannot be utilized for any other purpose, for instance, to authorize on Internet sites. Also, there should be the rule of the proper disclosure of only necessary information by telephone and in-person (Lakshmi & Gireesh, 2019). Such a verification procedure may allow confirming whether a particular person is the companys valid employee or not.

Thus, in addition to modern and high-quality security systems for computer networks for which large sums of money are spent, simple training may also be helpful. Nevertheless, it is essential to consider more advanced mechanisms for combating hacker attacks, in particular, the creation of firewalls and the effectiveness of these tools.

Firewalls and Their Effectiveness

In order to protect computer networks from sudden attacks and the theft of valuable data, such systems as firewalls have become popular and essential tools in the fight against cybercrime. As Neville and Foley (2018) state, a firewall is a set of software network filters that keeps track of the network packets coming into the computer and outgoing from it. These mechanisms control all the processes in accordance with the rules specified in a particular program.

It is a firewall that allows protecting a computer from unwanted incoming connections. As a rule, such utilities are included in the basic package of operating systems installed in the networks of both home and corporate use. However, those intruders who specialize in database theft can crack this legal protection easily. In this regard, work on creating robust and comprehensively protected firewalls is a significant aspect of a modern technology sphere. Installing a reliable filtering system is the key to information security, and the degree of the advancement of such tools influences their performance directly.

Types of Firewalls

In modern IT security, various programs designed to block malicious traffic appear regularly. Nevertheless, when analyzing available protection systems for networks, it is possible to distinguish two key varieties  hardware and software firewalls.

According to Sattar, Salah, Sqalli, Rafiq, and Rizwan (2017), the first type is installed as a separate device and is configured so that it could work as a door. For such a firewall to work, it should be installed between the local network and the Internet. The advantage of this method is the need for an attacker to first crack the security system before receiving direct access to any network resources. However, as Sattar et al. (2017) point out, such tools have a drawback, which is the necessity to purchase additional hardware.

A software firewall is a program installed on a computer that needs to be protected from network threats. Sattar et al. (2017) note that the advantages of this type are in a more straightforward setup and the absence of additional equipment. The disadvantages of software firewalls lie in the fact that they occupy system resources, and they require installing on all the workstations and servers of a particular network.

Firewall Contribution to Network Security

Using firewalls in data protection is a mandatory practice, particularly for those computer networks that are combined within the framework of corporate access. Despite the fact that, as Neville and Foley (2018) remark, firewall policy management is complex and error-prone, the importance of this procedure largely determines the degree of the security of stored information (p. 207). Therefore, in modern networks, a significant role is played by establishing special blockers filtering Internet traffic.

Methods of Network Hardening

The heterogeneity of hardware and software platforms requires manufacturers to protect compliance with a particular technological discipline. Not only purely protective characteristics are crucial, but also the possibility of embedding these systems in modern corporate information structures (Sharma & Chaurasia, 2018). If a mechanism designed to protect valuable information can function only on one operating system, its practical significance is questioned seriously. Corporate information systems are heterogeneous in yet another important respect  the data of the different degrees of importance and secrecy are stored and processed in their parts. Therefore, it is essential to find ways of hardening networks in addition to the aforementioned standards.

Integrity

The integrity rule as one of the methods of hardening computer networks involves ensuring the reliability and correct display of protected data. Sharma and Chaurasia (2018) argue that this work is to take place, regardless of which security systems and techniques are utilized in a particular company. Data processing should not be disrupted, and those users of the system who work with protected files should not face unauthorized modification, the destruction of resources, software malfunctions, or other violations. Therefore, this principle of strengthening networks is relevant in the context of preserving valuable information.

Confidentiality

The principle of confidentiality means that access to view and edit data is provided exclusively to the authorized users of a protection system. According to Sharma and Chaurasia (2018), in case of unforeseen situations like the loss of passwords, the transfer of personal data to third parties, and other errors, data theft may occur. Therefore, in addition to the aforementioned principles of IT security, it is crucial to establish a system of confidentiality that will allow eliminating any attempts of unauthorized access even among some employees of one organization. This will prevent accidental or intentional information leaks and provide an opportunity to control the activities of those responsible for access.

Accessibility

Accessibility as the mechanism of hardening computer networks has some conventions. In particular, as Sobeslav, Balik, Hornig, Horalek, and Krejcar (2017) state, in addition to firewalls designed to protect operating systems, the accessibility technology implies that all authorized users are to have access to confidential information.

Based on the previous method of confidentiality, it is essential to establish such a mode of authorization that may allow all persons involved in working with secret and crucial materials to use the resources of a particular network freely but responsibly. Such a step towards enhancing security will prevent unauthorized access and, at the same time, will be an incentive for individual employees to practice their skills in using networks capabilities in a strict algorithm. Thus, all of the aforementioned principles are relevant approaches to ensure the safety of valuable information and prevent its theft or hacking.

Conclusion

Due to the introduction of modern technologies for protecting computer networks, it becomes easier to preserve important data and prevents cyber attacks. Social engineering as the way of stealing data carries a risk to the security of personal and corporate information.

Nevertheless, utilizing modern firewalls and adhering to the principles of network hardening may allow maintaining a consistently high level of protection and saving software and all available resources from hacking. Therefore, the implementation of relevant mechanisms protecting digital resources contributes to preventing undesirable consequences and relieving oneself from the fear of data leakage.

References

Lakshmi, V. R. V., & Gireesh, K. T. (2019). Opportunistic mobile social networks: Architecture, privacy, security issues, and future directions. International Journal of Electrical and Computer Engineering, 9(2), 1145-1152.

Neville, U., & Foley, S. N. (2018). Reasoning about firewall policies through refinement and composition. Journal of Computer Security, 26(2), 207-254. Web.

Sattar, K., Salah, K., Sqalli, M., Rafiq, R., & Rizwan, M. (2017). A delay-based countermeasure against the discovery of default rules in firewalls. Arabian Journal for Science and Engineering, 42(2), 833-844. Web.

Sharma, R., & Chaurasia, S. (2018). An integrated perceptron Kernel classifier for the intrusion detection system. International Journal of Computer Network and Information Security, 10(12), 11-20. Web.

Sobeslav, V., Balik, L., Hornig, O., Horalek, J., & Krejcar, O. (2017). Endpoint firewall for local security hardening in an academic research environment. Journal of Intelligent & Fuzzy Systems, 32(2), 1475-1484. Web.

Thakur, K., Shan, J., & Pathan, A. S. K. (2018). Innovations of phishing defense: The mechanism, measurement, and defense strategies. International Journal of Communication Networks and Information Security, 10(1), 19-27.

Obscenity and Computer Ethics

Introduction

The following thesis has been written considering obscenity and ethics in the computer world. With the unprecedented growth in the use of the internet there has been a problem in its usage which has sometimes led to obscenity and need for computer ethics. Computer ethics became a necessity since the conventional principles of conduct could not be applied on the internet and computer usage. This article is aimed at addressing the issues related with obscenity and computer ethics and argues that both are equally important. Ethical concerns and obscenity issues have become a major concern since we use the computer at every walk of our life. Right from our medical records to our bills and payments and even the countrys defense system is based on computers. Unchecked violations in computer ethics and obscenity issues can lead to serious consequences both on our personal and national level.

Issue under consideration Obscenity and Computer Ethics

The issue being considered in this thesis is regarding obscenity and computer ethics. Classically ethics refers to those principles and standards which govern an individuals conduct. But as computers and technology has become a part of our daily life, they have provided us with a continued problem with difficult questions about our judgment. Thus, after the World Wide Web was introduced the meaning of ethics also changed and the term computer ethics evolved. Computer ethics refers to those rules of conduct which concerns computers and refers to the manners through which traditional ethics and customs are negotiated, tested, stretched, applied and sometimes even broken in the world of computers. Computer ethics became a necessity because the Internet and World Wide Web had produced a number of new and unexampled legal issues and questions which the older laws had no answers to. Thus the computer world needed more logical laws for governing the computers and the Internet since the earlier laws had become obsolete here. Computers and the internet were single handedly responsible for radically enhancing communication and manipulation of data raising numerous controversies and questions regarding ethics. (Bennington, 87-103)

Although technology has leaped ahead of time, morality needs to catch up to it since without the understanding of computer ethics people will not be properly ready to handle the world of our online societies. Every individual, irrespective of which field or career he or she belongs to will have to enter into this world either for work or to socialize, and at that point will be faced with ethical problems. Computer ethics helped the users in analyzing the total impact and the overall nature of computer and technology and justified the formulation of rules and policies so that technology and computers were used ethically. (Chatzidakis and Mitussis, 305-320)

Computer ethics have also become a necessity due to millions of computer crimes that take place daily in the form of malware attacks, copyright infringement, illegal distribution and identity theft. Hackers and attackers have been illegally using the computer as a medium for committing crimes making cyber crime one of the gravest challenges for the police authorities and prosecutors. Sometimes certain legal computer activities also pose ethical concerns, like the invasion of an individuals privacy when their computer activities and communications are monitored by others. The unlimited amount of data available through the Internet has increased the concern of businesses and individuals regarding computer ethics. It becomes very difficult for one not to take advantage of simple data manipulations through information technology and use it at the cost of others for their own good. But this creates the so talked about ethical concerns. With the increased competition among individuals and organizations certain strategies need to be developed so that technological innovations can be completely utilized but at the same time the boundaries of tolerable ethical considerations are maintained so that the system maintains its stability and the users benefit from it. (Bennington, 87-103)

The issue of obscenity comes into play when discussing the Internet or the World Wide Web because there is a lot of matter available through them which can be fairly categorized as obscene or inappropriate. The Internet provided people with a whole new media presenting them with so much information which one had never dreamt of. People were not only able to access a wide rage of information but were also able to communicate with each other all over the world within seconds. But some of this information was obscene and inappropriate too and those people who could never access such information or would not have done so, was easily able to assess it. Children too could access these obscene matters since the internet does not have any age barriers. Children, who did not understand what ethics were able to access obscene matters like pornography, join hate groups and even get information on building bombs all through the Internet. Although, the internet has proved to be a powerful tool for some, to other its cons have outweighed the pros. (Chatzidakis and Mitussis, 305-320)

With the growth of the internet we have also witnessed the growth in computer crimes which often involve the availability of obscene pictures on the Internet. Children are often found to be allured into sex or pornography by pedophiles through the Internet. Obscenity on the computer or the Internet presents us with the same legal problems which we face with obscenity in magazines or books. Obscenity, although extremely serious, sometimes does not seem to be as pressing as the various other criminal activities that take place on the Internet. Precise and reliable statistics have not yet been drawn regarding the quantity of computer crimes that take place and the number of victims that have been lost to it. Obscenity is a grave issue as it leads to silent crimes which cannot be easily detected either by the law enforcers or the victims and is thus, very little reported to the proper authorities. Computer technology and the internet have brought about a number of uncertainties due to which the establishment of clear ethical and behavioral codes has become a difficult task. Computer technology is being dramatically abused as company sites are being hacked and thefts are taking place online. (Bennington, 87-103)

One way to tackle the problem of obscenity is by censoring the inappropriate matter. But censoring does not help since something that is obscene to one may not be so to another. The basic problem with obscenity is that the idea of deeming something to be obscene or inappropriate changes with age, it is sometimes dependent on ones religion and is sometimes considered with a specific social condition. Thus, at times enforcement of immediate rules and regulations of moral values against obscenity are not always possible.

The only thing that could have done differently after critically analyzing this paper is that it could have concentrated a little more on the concerns regarding our present computer ethics, which include censorship, copyright and privacy. These topics are equally important considering the aims of my thesis and thus needs to be elaborately discussed. Another issue which I should have discussed is that of domain names which also falls under computer ethics. (Chatzidakis and Mitussis, 305-320)

Conclusion

From this article we learn that although computers and the Internet have provided us with a vast resource of information and technological potentials, they have also brought up concerns about ethics and cases of obscenity. Presently we have very few rules and regulations which can govern an individuals ethical behaviors or obscenity on the internet. After reading this article one will come to know about the issues of obscenity and computer ethics facing our world today. I hope that the readers understand how important computer ethics are for our world today. Parents need to be especially alert so that their children can be kept away from obscene matter on the internet and thus they need to realize what a huge issue obscenity on the computer can be. Through this article I want the readers to understand what computer ethics means and the ill effects of obscenity both on the computer and on the internet. They need to understand and realize these issues so that they can protect their families from any related issues and keep their children safe from online obscenities. After writing this article I have realized how harmful obscenity on the internet can be and why we need to have computer ethics.

Works Cited

Bennington, Tammy. Ethical implications of computer-mediated evaluation. New Directions for Evaluation 56.84 (2008): 87-103.

Chatzidakis, Andreas and Mitussis, Darryn. Computer ethics and consumer ethics: the impact of the internet on consumers ethical decision-making process. Journal of Consumer Behaviour 6.5 (2007): 305-320.

The Growth and Development of Computer Crimes

Introduction

The invention of computers basically as a vital communication tool has revolutionized mans lifestyle in a big way. It has made the world today to become too small and be referred to as a global village. This new development has led to emergence of a new wave of crime associated with computers. Unfortunately, the cyber security men have a very cumbersome task to curb this new form of crime. This is because cyber crime is a very complicated type of violation to control. First of all, it is not easy to identify the perpetrator of the crime. It may range from just an innocent young teenager hacker who is out to adventure to a well organized gang with a sole purpose to commit crime. To make matters worse, parents get worried more against internet predators, online child predators and pedophiles. The bright side of the matter, however, is that law enforcing agencies are working hand in hand to alleviate cyber crime. In this paper, I am going to examine in detail the growing crimes related to computers as well as diagnose some of the measures that can be put in place to counteract the vice.

Hacking

You may ask yourself a question, who are these hackers? They are all over. We hear about them in the news time and again. &Or worse yet, maybe you or your family or your friends have been the victim of hacking (Schwartau, 2000). Dangers of being hacked are open to all computer users. It is almost inevitable to elude this reality once you belong to this global society. Unfortunately there is a lot of misconception on hacking activities. Most people have had access to wrong information on hacking. Schwartau (2000) argues that hacking is not really what you thought it was after all. He emphasizes that hacking is deeply entrenched in the society we live in. The impact of this cyber crime, he adds, has more severe repercussions to every individual beyond our universal understanding. Hacking is a very serious vice that may end up consuming the societal fabric long before it is realized.

The society has changed and transformed through a series of stages, one of it being information technology. There is even greater need to conform and be flexible to the challenges brought about by this information age. In a sad note, however, we have created a global society where economists dont yet understand the global economy (Schwartau, 2000). The World Wide Web consists of computer network everywhere. This vast network controls sensitive activities like money transfer, movement of automobile machines like planes, and educational value to our children. Sincerely speaking, computers influence our daily activities in a variety of ways. Therefore, any crime associated with computers (hacking for instance) results in major consequences to every member in the society. The United States of America Department of Defense in April 1998 announced that it had been hacked 250,000 times in one week (Schwartau 2000). The media failed to report on that occurrence appropriately. To them, it seemed like it was not significant. However, according to Schwartau (2000), this event marked the first time the D.o.D openly admitted to attacks on such a vast scale.

There are several threats and risks that computer enthusiasts face in this global village. Outsiders who seek information from our computers without permission may pose a real threat to information security. Unfortunately, most hackers are insiders-white collar criminals, disgruntled employees harboring real or imagined grievances (Nichols, Ryan & Ryan, 2000). Another source of hackers may come from those who lose their patriotism and betray their countries. They do this with a promise for money or ideological incentives (Nichols et al., 2000). This explains why our information systems are highly vulnerable to both internal and external threats. It also gives us an objective view point why hacking is a very protracted form of cyber crime which may not be eradicated but rather it can only be minimized to lower levels. Nichols et al., (2000) unanimously agree that threats to information and information systems are paired with a specific line of attack or set of vulnerabilities

To deal with hacking more effectively, both threat and vulnerability factors should be put into consideration. We cannot depend on elimination of a vulnerability to neutralize a threat, or elimination of a threat to mean that vulnerability can be tolerated safely (Nichols et al., 2000). It is also very important to note that computer crimes can be used to commit a wide range of criminal activities such as credit card fraud, counterfeiting, bank embezzlement, and theft of secret documents (Nichols et al., 2000). If someone physically steals a data disk carrying a 2.0MB of important information, it amounts to theft. Equally, getting access to restricted sites in a computer is considered crime. This is why the society is so vulnerable and at the same time faces potential risks in this information age.

There have been several anti-hacking activities both in the past until to the present attempting to tame the vice. A case in point is the renowned Operation Sundevil of the 1990 which received a lot of public recognition (Bruce 1994). It was characterized by countrywide computer crackdown and had much success. According to Bruce (1994), Operation Sundevil was not intended to combat hacking in the sense of computer intrusion& The Chicago Computer Fraud and Abuse Task Force strategies were directed towards eradicating hacking. However, Operation Sundevil was a crackdown on those traditional scourges of the digital underground. (Bruce 1994). It took a different approach in facing out stealing of credit card and misuse of telephone codes. This operation left an indelible mark in the fight against hacking although its efforts were not directed towards anti-hacking. To fight this present age crime, decisive efforts by the relevant arms of governments are paramount. Nevertheless, regular cooperation among anti-hacking agencies is required.

Children Vulnerability

Parents are a worried lot. For those parents who think that their children are safe from cyber crime, they are wrong. All children who can read and write are vulnerable to this risk. According to Hitchcock & Page (2002), any child can become an online victim of child predators, harassment, stalking, pornography and more. Worst among children is the online pornography. It is then followed by enticement and the least risky threat is molestation.

Community policing in reporting any child related sex exploitation seem to be the basic solution to this. The NCMEC&added CyberTipline to its website&for the public to report&child sexual exploitation. It has worked (Hitchcock & Page, 2002). This organization is said to have recorded thirty seven thousand complaints since it was launched. It is, however, quite difficult to prosecute online cyber offenders and so most perpetrators go unpunished. Children should be well informed that everyone you meet online is a stranger, even your friends (Hitchcock & Page, 2002). Unless those friends get the approval of their parents, they remain to be strangers and no serious business can take place. In addition, helpful information for children who browse through the web is that they should not believe on every detail from online acquaintances. Some messages may be full of lies and misleading. According to Hitchcock & Page (2002), they should not give out personal information online to strangers. The same information might be used against them or their family members by these computer criminals.

Computer Protection

Finally, protecting your computer against possible threats is a worthy step to take. Consider these intruders into your computer; the Trojan, virus and hackers. They are nuisance and form a big network of cyber crime. A Trojan, for example, is a program designed to perform functions in a computer without the computer user knowing its there (Hitchcock & Page, 2002). This can be very destructive both to an individual user and to a corporate organization. Data loss and computer software damage are some of the obvious impacts. Viruses will similarly wipe out data because they are programs meant to disrupt safe and comfortable working of computers.

Hackers are people who want to taste a Web site or internet connection just to see if they can break in& (Hitchcock & Page, 2002). Some hackers do this for purpose of fun while others are well organized gangs out to create havoc to information security like credit card counterfeiting.

Stay Safe

It is still possible to avoid, even if not completely, the crimes related to the use of computers. Hitchcock & Page (2002) suggests that you should select a gender-neutral user name for the first part of your email address or chart or discussion forums. This will conceal your identity to cyber criminals and let you not be a victim in waiting.

Conclusion

In summing up this literature review, all of us must acknowledge the grim reality of the negative challenges brought about by the invention, growth, and development of computers. Whereas we have been fully absorbed in the comfort of Information and Communication Technology age, to an extent of being oblivious of the potential dangers and risks, it is high time individuals, corporate, and government agencies take a decisive step in addressing this twenty first century crime.

Our email addresses should be maintained as a private entity and should be used for people well known to us. This will keep fraudsters at bay. Other ways through which these criminals can catch up with you is through personal ads, free news letters, greeting cards, and guest books. Every possible caution should be taken when handling these online material exchanges.

Reference List

Bruce, S. (1994). The Hacker Crackdown: Law and Disorder on the Electronic Frontier. Champaign, Ill. Project Gutenberg.

Hitchcock, Jayne A.; Page, L. (2002). Net Crimes & Misdemeanors: Outmaneuvering the Spammers, Swindlers, and Stalkers Who Are Targeting You Online. Medford: N. J. Information Today.

Nichols, Randall K.; Ryan, Daniel J.; Ryan, Julie J.C.H (2000). Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves. New York: McGraw-Hill Professional.

Schwartau, W. (2000). Cyber Shock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption. New York: Thunders Mouth Press.

Dependence on Computers in the Modern Era

Introduction

The focal point of paper is to present a discussion on over dependence on computers in the modern era. For the purpose the paper would summarize and compare the studies. The first one is Shelley B. Wepners Technology Run Amok: The Top Ten TechnoBlunders published by International Reading Association, Inc in 2004 and the second article is Leslie P. Hitchs Being prepared for Technology Snow Days, published by Center for Applied Research in 2002. There would be other studies included in relation to the issue that would be helpful for the discussion.

Background of the problem

Production of electronic equipments and components has come a long way since the days of radio receivers in 1940s. From a simple power driven tool designed to carry out only one process, previously carried out by a single craftsman, most of the present day machines have become a highly integrated complex of mechanical equipment performing a series of processes automatically. This evolution or better described as revolution has had deep rooted effects on our socio economic environment, thus effecting human life. The most precious bequest of modern technology to mankind is computer and everyday human beings are becoming more dependent on it. Givens (2008) questions, But is this accelerating development of personal technology a good thing? Would the world we know and understand come crashing down around us if computer technology suddenly vanished from the face of the earth? (Givens, 2008)

Views of Hitch

Before the growth of information Technology revolution it was obvious for students to communicate face to face or through telephone with the teacher. Assignments were also presented in hard copies. However, with the availability of IT facilities students are relying more and more on information Technology and most of the data, if not all, are stored in the computers. Under such parameters the author constructs a scenario where it is found that no IT facilities are available and with it all the data of the students are lost. The author then prepares a list of remedies under such fictitious yet possible situation in order to prevent the data from loosing.

The alternate solution to the possible crisis is to prepare for such crisis. Here the authorities should formulate proper policies to counter the situation. In case there are no such policies then the legal risks should also be taken into consideration. Furthermore, the current policies should be evaluated in order to make it aligned with electronic education delivery system. Alongside, there are several recommendations for the students, like keeping backups and using alternate communication systems. However, the most important and practical measure stated by the author is up gradation and budget preparation. Planning for technology failure carries budget implications. Equipment must be upgraded and services regularly to function properly. Redundant equipment is an additional expense. Personnel cost of training and support must also be considered. (Hitch 2002) The author is not against technology but is sceptical and cautious.

Views of Wepner

Wepner indicates that one of the ten fundamental mistakes the people make about technology is that it can never fail. Even if technology fails, people feel that the help is right there for taking. She also mentions people feel that there would always be an active support system in case of techno blunder and they have superficial faith over software manufacturers. People also tend to use even difficult or boring websites even if manual work would have been easier. People also underestimate the technicalities of technology and overestimate their own command of it, making things more difficult. There is also a myth that teaching with technology would be much better than conventional teaching. Lastly, the author indicates that there is simply no existence of plan B and that could prove costly at times.

Wepner is more open about the use of technology in classroom. She actually feels that technology ultimately makes us better teachers because it improves our ability to tailor instruction and expose students to new information and communication tools. (Wepner 2004) Nevertheless, like Hitch, she prepares the readers about failure of technology but she mainly blames the wrong perception of the mass about technology and the myths associated with it in public mind.

Discussion

Invention of computer has miraculously changed the whole scenario. Computers not only impinged on global economy by increasing production, enhancing efficiency etc. Along with business sectors like banking, stock exchange etc, which witness extensive use of computers, other sectors have also been influenced by computers. Educational institutions, hospitals, etc are now days increasingly using computers. Due to their vast facilities of computers are becoming more and more popular among house holds also. Increasing number of people are using computers in their day to day life. (Malcolm 2000)

Along with several advantages of computer, many disadvantages also exist. Computers being machines containing many sophisticated parts, always have the risk of wear and tear and system smash up. Repair and reinstallation of computers becomes very expensive. Thus the computerized systems are at the same time both delicate and complicated in nature. Another disadvantage of computer systems is misuse of computers. Now days several illicit soft wares are available, which make possible unauthorized use of computer accounts, Illegal access to computer systems. Deliberately infecting computer systems with viruses or jamming computer systems, spoiling data fortification schemes, illegal accessing of others bank accounts, leaking question papers before examinations by hacking computer systems, harassing people on network, publishing illegal documents on network etc are general ways of misuse of computer systems. Use of computer system in several production units and organizations resulted in reduction in use of human resources. This leads to unemployment, further resulting in poverty and increasing crimes. Now days, with the advancement of technology and extensive use of computers, man is becoming more and more depended on it. Thus the whole generation is in jeopardy of losing the Sovereignty of emancipated thought and self confidence. (Mewar, 2007)

Conclusion

All the authors are in favour of preparing the students, teachers and authorities for a possible collapse of IT. However, while Hitch is more on the traditional or conventional side of teaching, Wepner is happy to make IT a part of her life and profession but they both are cautious and worried about Techno Blunder and find it a better option to prepare for the worst rather than suffer. However, it should be noted that There has been an unprecedented acceleration in mans knowledge of and power to control his material environment, such as, first of all steam, then electricity and now atomic energy simultaneously with these discoveries and inventions, there has been a similar accretion of knowledge about the materials used in manufacture and a progressive refinement of the machines them selves. Computer is the driving force of all these sections and thus the impact of computers on society is huge and it is fundamentally positive in the overall scenario but it is always better to b prepared for the worst condition and the authors suggests a development of Plan B in such state.

Bibliography

Givens, J. (2008) The Increasing Human Dependence on Computers. Associated Content, Inc.

Hitch, L.P. (2002) Being prepared for Technology Snow Days, Center for Applied Research, vol. 2002, no. 24.

Malcolm, C. (2000). Who Made the First Computer? The University of Edinburgh. Web.

Mewar, P. (2007). Health Problems Caused By Use Of Computers. Web.

Wepner, SB. (2004) Technology Run Amok: The Top Ten TechnoBlunders, International Reading Association, Inc. Web.

Modern Computers: Changes Within Our Current Technological World

Modern Computers and Their Functions in Human Lives

The use of computers changes human life considerably in different ways. People discover more ways on how to improve their work, communication, and calculations. Within a short period of time, a computer becomes an integral part of this life, and there is no person in the world, who has not heard about it.

Nowadays, there are many means by which computers are able to exchange information. Input and output devices allow fast and reliable transfer of information, and the demands of the quality of such devices raise considerably day by day.

Du to such qualified competitions, modern computers no longer contain such devices like serial ports and floppy drives.

Floppy Drives and Serial Ports

Floppy drives are the devices, by means of which, it is possible to read and write floppy disks. The middle of the 1980s was known due to a kind of revolution, when floppy disks became the most frequently used devices to share information. Unfortunately, small sizes and low speed turned out to be crucial for these devices, and people start inventing something more comfortable and reliable.

The destiny of serial ports is a bit similar to the destiny of floppy drives. This physical interface aims at transferring information between a computer and terminals or other possible peripherals.

The necessity to create the same ports at other devices creates numerous challenges and leads to the idea of create another kind of port to unite machines.

  • Inability to transfer huge amounts of information;
  • Low speed and constant wasting of time;
  • Considerable sizes of the device itself;
  • Too old technologies and their incompatibility with other devices;
  • All these are the reasons of why floppy drives become unnecessary for modern computers. People introduce more interesting and reliable things, which may replace the functions of floppy drives.

However, some professionals still make use of these drives to make the system work in accordance with the already established norms.

  • Considerable place to take;
  • Too complicated construction to use;
  • Ability to supersede for something better;
  • Inability to promise constant connection all the time.
  • These points play a very important role for the use of serial ports.

Still, server computers and some industrial automatic systems use these ports due to the inability to make some changes, improve the system, and not lose something really important.

Instead of Floppy Drives and Serial Ports

USB ports and FireWire substitute serial ports with time and provide computer users with an opportunity to transfer info faster and more reliable.

Varieties of CDs and DVDs and their abilities to store more information in an appropriate view attract the attention of users and make their work easier. Memory cards become one more invention that does not take much place and still store the same or even more amounts of information.

So, it is useless to analyze what device is better for computer users now, but the fact that floppy drives and serial ports are out of use and fashion is obvious. Just because of the reason that new time requires new ideas and new services.