Assignment Title
Professional Issues In IT
Lecturer Name :
Mr Hemanand
Subject :
Professional Issues In IT
Subject Code :
HNDIT 2403
HNDIT – 2018 (ATI Batticaloa)
Name
M.Mohamed Atheek
Reg.No :
BAT/IT/2018/FT/056
1 Briefly explain the following terms related to global
workforce
A –out sourcing:. Phenomenon where a company pays another
company to build parts for its products or services instead of
performing those tasks itself.
Outsourcing describes when a third party is used to produce or perform
a service normally managed by internal parties. Common examples of
outsourcing include call center operations, HR management (benefits
administration, payroll, etc.), or providing technical support. In each case,
these services could be performed in-house, but are instead offloaded to
reduce costs, improve service, or enhance capabilities.
B- Off shoring:. Offshoring is the relocation of a business process
from one country to another, typically an operational process (e.g.
Manufacturing) or supporting processes (e.g. accounting).
Offshoring, on the other hand, is an entirely separate business model. In this
scenario, domestic companies willingly choose to move or expand their
operations to other parts of the world.
2 Information technology as or positive and negative to the
students
A- List 20 negative effect of IT to the students
B- List 20 positive effect of IT to the students
1. Individual learning
2. Student are more in control of their learning
3. Incredibly improves performance in all subject
4. Discovery learning
5. Create quality project
6. Motivates learning
7. Intellectual development
8. Collaborative learning
9. Provide medium of research
10. Online studies
11. Electronic books
12. Accessibility
13. Get the new information
14. Distance learning
15. Ability to communication
16. Face the challenging work
17. Get new opportunities
18. interactive multi-media
19. New job opportunities
20. , Flexible and mobile working
3 Briefly Explain the different between law and ethics
In simple terms, the law may be understood as the systematic set of
universally accepted rules and regulation created by an appropriate
authority such as government, which may be regional, national,
international, etc. It is used to govern the action and behavior of the
members and can be enforced, by imposing penalties.
Many times the term law is juxtaposed with the term ethics, but there is a
difference, as ethics are the principles that guide a person or society,
created to decide what is good or bad, right or wrong, in a given situation.
It regulates a person’s behavior or conduct and helps an individual in
living a good life, by applying the moral rules and guidelines.
4 Briefly explain three categorize of ethical views
Deontological: Ethical theory concerned with duties and rights. How
people accomplish their goals is usually (or always) more important than
what people accomplish.
Utilitarianism: A system of ethics according to which the rightness or
wrongness of an action should be judged by its consequences. The goal of
utilitarian ethics is to promote the greatest happiness for the greatest
number. The notorious example is where there are 10 people on a boat
and everyone will die unless one gets thrown off. A utilitarian would
throw someone off the boat - probably the weakest/oldest one
Natural rights: Theory of universal rights that are seen as inherent in
the nature of people and not dependent on human actions or beliefs.
5 Briefly explain the following terms in relation to computer
data
A-Invisible information gathering:
Collection of personal information about someone without the person's knowledge.
B-Secondary use:
The use of personal information for a purpose other than the one for which it was supplied.
C-Computer Matching:
Computer matching refers to the computerized comparison of records for the purpose of
establishing or verifying eligibility for a federal benefit program or for recouping payments or
delinquent debts under such programs.
D-Computer Profiling:
A record system (or record systems) is searched for a specified combination of data
elements
6 Explain the way the concept of computer hacking change
over time from early 1960 up to today.
Hacking – currently defined as to gain illegal or unauthorized access to a
file, computer, or network
The term has changed over time
• 1: early 1960s to 1970s
– It was a positive term
– A "hacker" was a creative programmer who wrote elegant or clever
code
– A "hack" was an especially clever piece of code
• 2: 1970s to mid 1990s
– Hacking took on negative connotations
– Breaking into computers for which the hacker does not have
authorized access
– Still primarily individuals
– Includes the spreading of computer worms and viruses
– Companies began using hackers to analyze and improve security
• 3: beginning with the mid 1990s
– The growth of the Web changed hacking; viruses and worms could
be spread rapidly
– Political hacking (Hacktivism) surfaced
– Denial-of-service (DoS) attacks used to shut down Web sites
– Large scale theft of personal and financial information
Now computer hacking is the important concept in the world because it is
increasing every day.
7 Briefly describe forming laws for the field of information
and communication technology.
IT law is primarily defined by its practical rather than its legal subject matter. It
is concerned with:
o The compliance of IT systems with legal requirements
o The management of legal risks arising out of IT systems
o Contracts and agreements relating to IT systems and
o The resolution of disputes relating to IT systems
The areas of law that affect legal compliance are wide-ranging. Relevant
statutes include the Data Protection Act 1998, the Regulation of
Investigatory Powers Act 2000 and the Computer Misuse Act 1990. Strict
legal compliance is not the same thing as comprehensive risk
management. IT systems may give rise to legal risks under intellectual
property law, the law of negligence, the law of privacy and
confidentiality, and many other legal areas besides. IT lawyers advise on
both the design and operation of IT systems to minimize these risks.
Probably the largest part of IT law in terms of lawyer-hours is invested in
contracts and agreements relating to IT: software license agreements,
software development agreements, software maintenance agreements,
hardware sale and rental agreements, IT consultancy agreements,
system integration agreements, IT outsourcing agreements, ASP and
SaaS agreements. The creation of these documents requires a fair
understanding of the IT systems in question, as well as the relevant law.
From massive IT contract litigation to summary domain name
arbitrations, IT disputes are as diverse as IT itself. IT disputes are
sometimes handled by generalist litigators and barristers, but specialists
are usually preferable, particularly where complex factual issues arise or
where an understanding of the IT industry is important. If you require
assistance with any aspect of IT law, please get in touch. SEQ Legal has
particular expertise in web-related IT law and the law relating to
software; and our law firm referral partners cover these and other areas
of IT law: notably IT outsourcing and litigation
8 What is NIPO Srilanka ? Mention the responsibility of
NIPO in srilanka?
The National Intellectual Property Office of Sri Lanka established
under this law is the government department, which is responsible for the
administration of the intellectual Property System in Sri Lanka.
Protection for
Copy rights
Patents
Marks
Industrial Designs
9 Digital technology and the internet has made copyright
violations easier and cheaper .
A- Do you agree with this ?
B- Give the reason to prove your answer
Yes, Because Copyright infringement or violation(colloquially referred to as
piracy) is the use of works protected by copyright law without permission for a
usage where such permission is required, thereby infringing certain exclusive
rights granted to the copyright holder, such as the right to reproduce, distribute,
display or perform the protected work, or to make derivative works. The
copyright holder is typically the work's creator, or a publisher or other business
to whom copyright has been assigned. Copyright holders routinely invoke legal
and technological measures to prevent and penalize copyright infringement.
Copyright infringement disputes are usually resolved through direct
negotiation, a notice and take down process, or litigation in civil court.
Egregious or large-scale commercial infringement, especially when it
involves counterfeiting, is sometimes prosecuted via the criminal justice
system. Shifting public expectations, advances in digital technology, and
the increasing reach of the Internet have led to such widespread,
anonymous infringement that copyright-dependent industries now focus
less on pursuing individuals who seek and share copyright-protected
content online, and more on expanding copyright law to recognize and
penalize, as indirect infringers, the service providers and software
distributors who are said to facilitate and encourage individual acts of
infringement by others.
10 Mention five possible health problems arise due to IT
industry . Briefly explain how those problem can be available .
1. Musculoskeletal Problems
This includes areas of your body such as your back, neck, chest, arms,
shoulders and feet.
Having sore muscles and complaints of the muscles being tired are
common.
Numbness may occur in the arms and hands.
These troubles may occur because the posture you assume when using the
computer is most likely incorrect.
You may find that you are sitting in an uncomfortable chair, or that you
have a workstation that is not ergonomically correct for your body.
2. Vision Problems
Computers are notorious for their bright lights, glare and flickering
images that can cause strain on your eyes.
Finding that you constantly focusing on the screen with delays in blinking
can result in drying out your eyes.
3. Repetitive Stress Injuries
You may notice pain in your neck, shoulders, or really anywhere from the
shoulders to your fingers related to repetitive muscle use.
Using the computer may cause you to use your muscles in an odd way
that may cause increased stiffness, pain, or swelling in any of those areas.
One of the most common conditions related to repetitive use of your
muscles when using the computer is carpal tunnel syndrome.
4. Headaches
Headaches are common and may occur because of the increased muscle
tension or from pain in the neck.
Any vision problems, or continued strain on the eyes can also cause
headaches.
5. Obesity
Prolonged use of computers may lead to an overall sedentary lifestyle that
lacks adequate physical activity and/or exercise.
In children prolonged use of computers, or electronics in general, is a
major contributing factor to obesity
11 What is computer crime ? Give five examples the computer
crime?
Alternatively referred to as cyber crime, e-crime, electronic crime,
or hi-tech crime. Computer crime is an act performed by a
knowledgeable computer user, sometimes referred to as a hacker that
illegally browses or steals a company's or individual's private
information. In some cases, this person or group of individuals may be
malicious and destroy or otherwise corrupt the computer or data files.
1. Copyright violation - Stealing or using another
person's Copyrighted material without permission.
2.Cracking - Breaking or deciphering codes that are being used to protect
data.
3.Cyber terrorism - Hacking, threats, and blackmailing towards a
business or person.
4.Cyberbully or Cyber stalking - Harassing or stalking others online.
5.Cybersquatting - Setting up a domain of another person or company
with the sole intentions of selling it to them later at a premium price.
6.Creating Malware - Writing, creating, or distributing malware
(e.g., viruses and spyware.)
7.Denial of Service attack - Overloading a system with so many requests
it cannot serve normal requests.
8.Espionage - Spying on a person or business.
9. Fraud - Manipulating data, e.g., changing banking records to transfer
money to an account or participating in credit card fraud.
12 Give ten techniques to protect your personal and financial
information in case of online Shopping.
1. Use a good anti-malware program. ...
2. Optimize PC's security settings. ...
3. Share payment information only with known or reputable vendors.
4. Use a credit card instead of a debit card. ...
5. Make sure the order checkout area is encrypted. ...
6. Print or save a copy of our orders. ...
7. Use strong passwords. ...
8. Check our statements often.
9. Change the password often
10.Link the transaction to the E mail
13 What is digital forgery give five Examples ?
Forgery is the criminal act that provides misleading information about a
product or service. It is the process of making, adapting, or imitating
documents or objects with the intent to deceive. Digital forgery (or digital
tampering) is the process of manipulating documents or images for the
intent of financial, social or political gain. This paper provides a brief
introduction to the digital forgery.
Examples
14 Explain the term net neutrality and state the purpose it?
Network neutrality or “net neutrality” is often used as a broad label in
public policy and regulatory discussions concerning these issues. Net
neutrality, however, is a wide-ranging term that can mean different things
depending on one’s point of view. Discussions about net neutrally, for
example, often touch on concerns about freedom of expression,
competition of service and user choice, impact on innovation,
nondiscriminatory traffic management practices, pricing, and overall
business models.
It is the principle that Internet service providers (ISPs) should give
consumers access to all legal content and applications on an equal basis,
without favoring some sources or blocking others.
It prohibits ISPs from charging content providers for speedier delivery of
their content on "fast lanes" and deliberately slowing the content from
content providers that may compete with ISPs.
The Federal Communications Commission (FCC) in USA passed new net
neutrality regulations designed to protect the free flow of content on the
Internet.
15 The computer crime act 24 at 2007 specify three broad
category of computer crime .Briefly explain the category.
Computer related Crimes – Computers used as a tool for criminal
activity such as theft, fraud etc.
Hacking – Affects integrity, availability and confidentiality of a
computer system or network (also includes viruses, worms etc.)
Content related Cyber Crime – Computers with internet used to
distribute illegal data. E.g.: Internet based pornography, criminal
copyright violation.