Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
322 views11 pages

Assignment Title: Professional Issues in IT

The document discusses various topics related to professional issues in information technology including outsourcing, offshoring, effects of IT on students, differences between law and ethics, ethical views, computer data terms, the evolution of computer hacking, forming IT laws, the National Intellectual Property Office of Sri Lanka, how digital technology has made copyright violations easier, and factors affecting job satisfaction.

Uploaded by

hemacrc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
322 views11 pages

Assignment Title: Professional Issues in IT

The document discusses various topics related to professional issues in information technology including outsourcing, offshoring, effects of IT on students, differences between law and ethics, ethical views, computer data terms, the evolution of computer hacking, forming IT laws, the National Intellectual Property Office of Sri Lanka, how digital technology has made copyright violations easier, and factors affecting job satisfaction.

Uploaded by

hemacrc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Assignment Title

Professional Issues In IT

Lecturer Name :
Mr Hemanand

Subject :
Professional Issues In IT

Subject Code :
HNDIT 2403

HNDIT – 2018 (ATI Batticaloa)


Name
M.Mohamed Atheek

Reg.No :
BAT/IT/2018/FT/056
1 Briefly explain the following terms related to global
workforce

A –out sourcing:. Phenomenon where a company pays another


company to build parts for its products or services instead of
performing those tasks itself.

Outsourcing describes when a third party is used to produce or perform


a service normally managed by internal parties. Common examples of
outsourcing include call center operations, HR management (benefits
administration, payroll, etc.), or providing technical support. In each case,
these services could be performed in-house, but are instead offloaded to
reduce costs, improve service, or enhance capabilities.

B- Off shoring:. Offshoring is the relocation of a business process


from one country to another, typically an operational process (e.g.
Manufacturing) or supporting processes (e.g. accounting).
Offshoring, on the other hand, is an entirely separate business model. In this
scenario, domestic companies willingly choose to move or expand their
operations to other parts of the world.

2 Information technology as or positive and negative to the


students

A- List 20 negative effect of IT to the students


B- List 20 positive effect of IT to the students

1. Individual learning
2. Student are more in control of their learning
3. Incredibly improves performance in all subject
4. Discovery learning
5. Create quality project
6. Motivates learning
7. Intellectual development
8. Collaborative learning
9. Provide medium of research
10. Online studies
11. Electronic books
12. Accessibility
13. Get the new information
14. Distance learning
15. Ability to communication
16. Face the challenging work
17. Get new opportunities
18. interactive multi-media
19. New job opportunities
20. , Flexible and mobile working

3 Briefly Explain the different between law and ethics


In simple terms, the law may be understood as the systematic set of
universally accepted rules and regulation created by an appropriate
authority such as government, which may be regional, national,
international, etc. It is used to govern the action and behavior of the
members and can be enforced, by imposing penalties.

Many times the term law is juxtaposed with the term ethics, but there is a
difference, as ethics are the principles that guide a person or society,
created to decide what is good or bad, right or wrong, in a given situation.
It regulates a person’s behavior or conduct and helps an individual in
living a good life, by applying the moral rules and guidelines.
4 Briefly explain three categorize of ethical views

Deontological: Ethical theory concerned with duties and rights. How


people accomplish their goals is usually (or always) more important than
what people accomplish.

Utilitarianism: A system of ethics according to which the rightness or


wrongness of an action should be judged by its consequences. The goal of
utilitarian ethics is to promote the greatest happiness for the greatest
number. The notorious example is where there are 10 people on a boat
and everyone will die unless one gets thrown off. A utilitarian would
throw someone off the boat - probably the weakest/oldest one

Natural rights: Theory of universal rights that are seen as inherent in


the nature of people and not dependent on human actions or beliefs.

5 Briefly explain the following terms in relation to computer


data

A-Invisible information gathering:


Collection of personal information about someone without the person's knowledge.
B-Secondary use:
The use of personal information for a purpose other than the one for which it was supplied.
C-Computer Matching:
Computer matching refers to the computerized comparison of records for the purpose of
establishing or verifying eligibility for a federal benefit program or for recouping payments or
delinquent debts under such programs.
D-Computer Profiling:
A record system (or record systems) is searched for a specified combination of data
elements
6 Explain the way the concept of computer hacking change
over time from early 1960 up to today.
Hacking – currently defined as to gain illegal or unauthorized access to a
file, computer, or network
The term has changed over time
• 1: early 1960s to 1970s
– It was a positive term
– A "hacker" was a creative programmer who wrote elegant or clever
code
– A "hack" was an especially clever piece of code

• 2: 1970s to mid 1990s


– Hacking took on negative connotations
– Breaking into computers for which the hacker does not have
authorized access
– Still primarily individuals
– Includes the spreading of computer worms and viruses
– Companies began using hackers to analyze and improve security

• 3: beginning with the mid 1990s


– The growth of the Web changed hacking; viruses and worms could
be spread rapidly
– Political hacking (Hacktivism) surfaced
– Denial-of-service (DoS) attacks used to shut down Web sites
– Large scale theft of personal and financial information
Now computer hacking is the important concept in the world because it is
increasing every day.
7 Briefly describe forming laws for the field of information
and communication technology.
IT law is primarily defined by its practical rather than its legal subject matter. It
is concerned with:
o The compliance of IT systems with legal requirements
o The management of legal risks arising out of IT systems
o Contracts and agreements relating to IT systems and
o The resolution of disputes relating to IT systems

The areas of law that affect legal compliance are wide-ranging. Relevant
statutes include the Data Protection Act 1998, the Regulation of
Investigatory Powers Act 2000 and the Computer Misuse Act 1990. Strict
legal compliance is not the same thing as comprehensive risk
management. IT systems may give rise to legal risks under intellectual
property law, the law of negligence, the law of privacy and
confidentiality, and many other legal areas besides. IT lawyers advise on
both the design and operation of IT systems to minimize these risks.
Probably the largest part of IT law in terms of lawyer-hours is invested in
contracts and agreements relating to IT: software license agreements,
software development agreements, software maintenance agreements,
hardware sale and rental agreements, IT consultancy agreements,
system integration agreements, IT outsourcing agreements, ASP and
SaaS agreements. The creation of these documents requires a fair
understanding of the IT systems in question, as well as the relevant law.
From massive IT contract litigation to summary domain name
arbitrations, IT disputes are as diverse as IT itself. IT disputes are
sometimes handled by generalist litigators and barristers, but specialists
are usually preferable, particularly where complex factual issues arise or
where an understanding of the IT industry is important. If you require
assistance with any aspect of IT law, please get in touch. SEQ Legal has
particular expertise in web-related IT law and the law relating to
software; and our law firm referral partners cover these and other areas
of IT law: notably IT outsourcing and litigation
8 What is NIPO Srilanka ? Mention the responsibility of
NIPO in srilanka?
The National Intellectual Property Office of Sri Lanka established
under this law is the government department, which is responsible for the
administration of the intellectual Property System in Sri Lanka.

Protection for
 Copy rights
 Patents
 Marks
 Industrial Designs
9 Digital technology and the internet has made copyright
violations easier and cheaper .
A- Do you agree with this ?
B- Give the reason to prove your answer
Yes, Because Copyright infringement or violation(colloquially referred to as
piracy) is the use of works protected by copyright law without permission for a
usage where such permission is required, thereby infringing certain exclusive
rights granted to the copyright holder, such as the right to reproduce, distribute,
display or perform the protected work, or to make derivative works. The
copyright holder is typically the work's creator, or a publisher or other business
to whom copyright has been assigned. Copyright holders routinely invoke legal
and technological measures to prevent and penalize copyright infringement.
Copyright infringement disputes are usually resolved through direct
negotiation, a notice and take down process, or litigation in civil court.
Egregious or large-scale commercial infringement, especially when it
involves counterfeiting, is sometimes prosecuted via the criminal justice
system. Shifting public expectations, advances in digital technology, and
the increasing reach of the Internet have led to such widespread,
anonymous infringement that copyright-dependent industries now focus
less on pursuing individuals who seek and share copyright-protected
content online, and more on expanding copyright law to recognize and
penalize, as indirect infringers, the service providers and software
distributors who are said to facilitate and encourage individual acts of
infringement by others.
10 Mention five possible health problems arise due to IT
industry . Briefly explain how those problem can be available .
1. Musculoskeletal Problems

 This includes areas of your body such as your back, neck, chest, arms,
shoulders and feet.
 Having sore muscles and complaints of the muscles being tired are
common.
 Numbness may occur in the arms and hands.
 These troubles may occur because the posture you assume when using the
computer is most likely incorrect.
 You may find that you are sitting in an uncomfortable chair, or that you
have a workstation that is not ergonomically correct for your body.

2. Vision Problems

 Computers are notorious for their bright lights, glare and flickering
images that can cause strain on your eyes.
 Finding that you constantly focusing on the screen with delays in blinking
can result in drying out your eyes.

3. Repetitive Stress Injuries

 You may notice pain in your neck, shoulders, or really anywhere from the
shoulders to your fingers related to repetitive muscle use.
 Using the computer may cause you to use your muscles in an odd way
that may cause increased stiffness, pain, or swelling in any of those areas.
 One of the most common conditions related to repetitive use of your
muscles when using the computer is carpal tunnel syndrome.

4. Headaches

 Headaches are common and may occur because of the increased muscle
tension or from pain in the neck.
 Any vision problems, or continued strain on the eyes can also cause
headaches.

5. Obesity

 Prolonged use of computers may lead to an overall sedentary lifestyle that


lacks adequate physical activity and/or exercise.
 In children prolonged use of computers, or electronics in general, is a
major contributing factor to obesity
11 What is computer crime ? Give five examples the computer
crime?
Alternatively referred to as cyber crime, e-crime, electronic crime,
or hi-tech crime. Computer crime is an act performed by a
knowledgeable computer user, sometimes referred to as a hacker that
illegally browses or steals a company's or individual's private
information. In some cases, this person or group of individuals may be
malicious and destroy or otherwise corrupt the computer or data files.

1. Copyright violation - Stealing or using another


person's Copyrighted material without permission.

2.Cracking - Breaking or deciphering codes that are being used to protect


data.
3.Cyber terrorism - Hacking, threats, and blackmailing towards a
business or person.

4.Cyberbully or Cyber stalking - Harassing or stalking others online.

5.Cybersquatting - Setting up a domain of another person or company


with the sole intentions of selling it to them later at a premium price.

6.Creating Malware - Writing, creating, or distributing malware


(e.g., viruses and spyware.)

7.Denial of Service attack - Overloading a system with so many requests


it cannot serve normal requests.

8.Espionage - Spying on a person or business.

9. Fraud - Manipulating data, e.g., changing banking records to transfer


money to an account or participating in credit card fraud.
12 Give ten techniques to protect your personal and financial
information in case of online Shopping.

1. Use a good anti-malware program. ...


2. Optimize PC's security settings. ...
3. Share payment information only with known or reputable vendors.
4. Use a credit card instead of a debit card. ...
5. Make sure the order checkout area is encrypted. ...
6. Print or save a copy of our orders. ...
7. Use strong passwords. ...
8. Check our statements often.
9. Change the password often
10.Link the transaction to the E mail

13 What is digital forgery give five Examples ?

Forgery is the criminal act that provides misleading information about a


product or service. It is the process of making, adapting, or imitating
documents or objects with the intent to deceive. Digital forgery (or digital
tampering) is the process of manipulating documents or images for the
intent of financial, social or political gain. This paper provides a brief
introduction to the digital forgery.

Examples
14 Explain the term net neutrality and state the purpose it?

Network neutrality or “net neutrality” is often used as a broad label in


public policy and regulatory discussions concerning these issues. Net
neutrality, however, is a wide-ranging term that can mean different things
depending on one’s point of view. Discussions about net neutrally, for
example, often touch on concerns about freedom of expression,
competition of service and user choice, impact on innovation,
nondiscriminatory traffic management practices, pricing, and overall
business models.

It is the principle that Internet service providers (ISPs) should give


consumers access to all legal content and applications on an equal basis,
without favoring some sources or blocking others.
It prohibits ISPs from charging content providers for speedier delivery of
their content on "fast lanes" and deliberately slowing the content from
content providers that may compete with ISPs.
The Federal Communications Commission (FCC) in USA passed new net
neutrality regulations designed to protect the free flow of content on the
Internet.

15 The computer crime act 24 at 2007 specify three broad


category of computer crime .Briefly explain the category.

 Computer related Crimes – Computers used as a tool for criminal


activity such as theft, fraud etc.
 Hacking – Affects integrity, availability and confidentiality of a
computer system or network (also includes viruses, worms etc.)
 Content related Cyber Crime – Computers with internet used to
distribute illegal data. E.g.: Internet based pornography, criminal
copyright violation.

You might also like