• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

People and IT

Extracts from this document...


People and IT Ever since industrial revolution, people have feared that machinery will replace workers, and Information Technology us no exception. In spite of dire predictions, however, there is no evidence that the introduction of computers has led to mass unemployment - in fact, over computers have created all more jobs than have been replaced by them. Nevertheless, in some areas computers have substantially replaced the workforce. In the 1980s, thousands of factory workers were made redundant by the introduction of robots on the factory floor making everything from biscuits to cars. In the 1990s, thousands of clerical and white-collar workers saw their Jobs disappear with the introduction of company databases, desktop publishing, computerised accounting systems and increased automation in banks, building societies and organisations of all kinds, large and small. Teleworking involves carrying out work away from the office and communicating with the employer through the use of a computer and telecommunications equipment. Often Tele-workers are based at home, but they can also work from Telecentres, satellite offices or even on the move. Although a study done in 1995 at Newcastle University found that less than 1 worker out off 100 was a Teleworker (spending at least half of their working week at home using the computer), organisation are becoming increasingly interested in various forms of Teleworking, which are becoming increasingly interested in various forms of Teleworking, which has benefits both for the employer and the employee. According to research done by Henley Business School in 1997, there are already 4 million Teleworkers in the UK. ...read more.


The office should be well lit. Computers should neither face windows or back into a window so those users have to sit with the sun in their eyes. Adjustable blinds onto a window should be provided. * Furniture. Chairs should be adjustable height, with a backrest, which tilts to support the user at work and at rest, and should swivel on a five-point base. It should be at the correct height relative to a keyboard on the desk. * Work space. The combination of chair, desk and computer accessories (such as document holders, mouse ad mouse mats, paper trays and so on), lighting, heating and ventilation all contribute to the workers over all well being. * Noise. Noisy printers, for example, should be given covers to reduce the noise or position in a different room. * Hardware. The screen must tilt and swivel and be flicker-free, the keyboard must be separately attached. * Software. Software is often overlooked in the quest ergonomic perfection. The EEC directive made a clear statement about the characteristics of acceptable software, requiring employers to analyse the tasks, which their employers perform and to provide software which makes the tasks easier. IT is also expected to be easy to use and an adaptable to the users experience. Computers can be responsible for a whole raft of health problems, from eyestrain to wrist injuries, back problems to fetal abnormalities, stomach ulcers to mental collapse. Articles appear regularly in the newspaper relating stories of employers who are suing their employers for computer related illnesses. ...read more.


Offences include using pirate copies of software and using software on more machines that are permitted under the terms of the licence. A few ways in which a compute user could protect the computer from hackers and viruses are: - * Having a fire wall on the computer to stop hackers from invading the computer * Have the password for the computer changed regularly, this is because it will stop people from guessing the password easily * Have an anti-virus program on the computer, this detects and cleans the computer from most viruses as long as it is up to data. The rights to privacy are a fundamental human right and one that we will take for granted. Most of us for instance, would not want our medical records freely circulated, and many people are sensitive about revealing their age, religious beliefs, family circumstances or academic qualifications. In the UK even the use of a name and address files or mail shots are often felt to be an invasion of privacy. With the advent of large computerised databases it became quite feasible for sensitive personal information to be stored without the individual and accessed by, say, a prospective employer, credit card company or insurance company to assess some bodies suitability for employment, credit or insurance. Below is the data protection Act that must be followed by all companies. * Fairly and Lawfully processed * Processed for a limited purpose * Adequate, relevant and not excessive * Accurate * Not kept longer than necessary * Processed in accordance with the data subjects rights * Secure * Not transferred to countries without adequate protection. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Analysis of market, environmental forces, competitors, marketing mix and consumer implementation.

    Attempt to establish the console as the digital centre of the living room, incorporating different other devices as CD and DVD-Player. Increasing importance of gaming and online communities for social contact. Ability to compete against any other player anywhere at any time via Internet creates a continuous challenge to the gamer, hooks him.

  2. Designing a booking system for an Estate Agent.

    I then went on to observe the skills that each user possesses. From observing I can tell that they have sufficient knowledge working with computer applications. On a daily basis they mostly use Microsoft programmes such as Word, Publisher and PowerPoint.

  1. Video World Database as ICT project.

    Test 23- Test the returned button in the rentals form. This test was successful because when you press the button the record is deleted. Test 24- Test all the menu options in the reports menu. This test was successful because all of the reports opened.

  2. ICT Security Report

    These external threats include hackers, viruses and Trojans, phishing, denial of services (DOS), operating problem services and by using public computers of wireless networks. Hackers Hackers are people who enjoy playing with computers, a small minority of whom commit computer crime for the intellectual challenge of breaking into a computer.

  1. A relative of mine works for a corporate firm on CRM (Customer Relationship Management) ...

    This raises research questions like "Which is the best software vendor to rely on?" and "What are the different issues concerned with failure in different software products?" Following are the problems faced by different corporate executives in the corporate world in implementing CRM and by going through these will give

  2. ICT Solutions for people with Special Needs.

    What is Physical Impairment / having limited use of limbs? There are many types and degrees of Physical Impairment. Perception, muscle control, and strength can be generally reduced as with some elderly people or more specifically with amputees or the blind.

  1. Planning a payroll system for a martial arts school.

    Justification of reasons for the Solution At the moment the current system consists of manually calculating the details on a form that the employee fills in and is signed by their manager. The employee fill in a form with his details (employee number, surname and forename, grade, hours worked...)

  2. Assess ways in which information technology can enable visually impaired students to access their ...

    education. During the 1980s when the microcomputer was all pervasive the general configuration of operating systems tended to be text-based. This was also the case during the early 1990s, with the rise in prominence of the Internet and World

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work