Friday, 6 November 2009

Communication in the Information Age

Communication throughout the information age has become much better. Now it is easier to communicate with other people. Communications have changed from letters through to instant messaging, below is a timeline of all the important dates regarding improvements in communicating in the information age.

1836 - First working telegraph to use morse code.
1843 - First ever fax machine invented.
1876 - First telephone invented.
1895 - First radio signal sent.
1929 - First demonstration of television.
1956 - First mobile phone invented.
1971 - First use of Email.
1982 - First ever use of VOIP.
1992 - First SMS message sent.
1994 - Bluetooth invented.
1995 - MSN invented with the release of Windows 95
1995 - Company called WELL, which is the first social networking site.
2004 - Facebook was invented.
2005 - Skype was invented.

Some of the above inventions have stood the test of time whereas others haven't.

Thursday, 5 November 2009

Computer Use policy

Different servers have different policies regarding what people can do on computer's in the workplace and they each have a set amount of rules stating what users can and cannot do. Here is some of rules that could be used by a school or a company to make sure that they keep on task for their work:

  • No social networking or video streaming sites. Searches are filtered on certain things. There should be a web blocker on IPlayer, Youtube and Pornography.
  • No installation of software - Server technitions must intall programs that are needed. No downloads of software from websites like Microsoft.
  • Email filtering to recognise offensive or offencive or inappropriate words. Only Accesible to Email others on the system.
  • Must contact member of staff to get permission to use USB devices.
  • Every Username must have a password that contains at least 6 characters which needs to be renewed at least every 6 weeks.
  • Each individual must use their own user account. People are responsible for any actions on their account. People are expected to not share user identity.
  • People should not attempt to access material that they do not have permission to access.
  • Do not alter data or change any programs which you do not have the right to alter.
  • Consequences such as banning for misuse of the systems.
  • Do not connect to any other server or network device that operates on a wireless frequency without permission.
  • Do not use Email and the internet to send offensive messages.
  • No use of disk drives unless it is used for appropriate school work.

Tuesday, 3 November 2009

Civil Rights

The civil rights act means that people have rights that protect them from the government and state power and assure the ability to participate in the civil and political life of the state. The data protection act was introduced in 1998 and was passed by Parliament to control the way information is handled and to give legal rights to people who have information stored about them. It takes place in other countries as well as the UK. Businesses, organisations and the government began using computers to store information about their customers, clients and staff in databases towards the second half of the 20th century. For example:

  • Names
  • Addresses
  • Contact information
  • Employment history
  • Medical conditions
  • Convictions
  • Credit history

With more and more organisations using computers to store personal information there was a danger the information could be misused or get into the wrong hands. A number of concerns arose such as who exactly could access this information? and Could it be easily copied? The 1998 data protection act was made by parliament to control the way information is handled and also to give legal rights to those people who have information stored about them.

Countries now use a fingerprinting system to prove who they are because every person's finger will obviously be different. Also there is face recognition software so it is easier to track down criminals. This links to CCTV cameras which have been installed in a lot of places to monitor the safety of areas. They usually record 24 hours a day and are a good way of seeing what has happened in the area if a crime has taken place. The problem is that lots of people might not want information about themselves stored on a system because of privacy, however it could be said that if they do not want this information about themselves stored, then perhaps they have something to hide which makes them look suspicious regarding certain crimes.

The computer misuse act became law in August 1990. It aims to reduce hacking and the threat from viruses, the act identifies three main procedures:

  • Unauthorised access to computer material (hacking). This includes copying software illegally (called software piracy).
  • Gaining unauthorised access to a computer to carry out serious crimes like fraud or blackmail.
  • Unauthorised changing of computer files, including planting viruses and deleting files.

If u commit any of the above, it can lead to an unlimited fine or 5 years in prison.