• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

People and IT

Extracts from this document...


People and IT Ever since industrial revolution, people have feared that machinery will replace workers, and Information Technology us no exception. In spite of dire predictions, however, there is no evidence that the introduction of computers has led to mass unemployment - in fact, over computers have created all more jobs than have been replaced by them. Nevertheless, in some areas computers have substantially replaced the workforce. In the 1980s, thousands of factory workers were made redundant by the introduction of robots on the factory floor making everything from biscuits to cars. In the 1990s, thousands of clerical and white-collar workers saw their Jobs disappear with the introduction of company databases, desktop publishing, computerised accounting systems and increased automation in banks, building societies and organisations of all kinds, large and small. Teleworking involves carrying out work away from the office and communicating with the employer through the use of a computer and telecommunications equipment. Often Tele-workers are based at home, but they can also work from Telecentres, satellite offices or even on the move. Although a study done in 1995 at Newcastle University found that less than 1 worker out off 100 was a Teleworker (spending at least half of their working week at home using the computer), organisation are becoming increasingly interested in various forms of Teleworking, which are becoming increasingly interested in various forms of Teleworking, which has benefits both for the employer and the employee. According to research done by Henley Business School in 1997, there are already 4 million Teleworkers in the UK. ...read more.


The office should be well lit. Computers should neither face windows or back into a window so those users have to sit with the sun in their eyes. Adjustable blinds onto a window should be provided. * Furniture. Chairs should be adjustable height, with a backrest, which tilts to support the user at work and at rest, and should swivel on a five-point base. It should be at the correct height relative to a keyboard on the desk. * Work space. The combination of chair, desk and computer accessories (such as document holders, mouse ad mouse mats, paper trays and so on), lighting, heating and ventilation all contribute to the workers over all well being. * Noise. Noisy printers, for example, should be given covers to reduce the noise or position in a different room. * Hardware. The screen must tilt and swivel and be flicker-free, the keyboard must be separately attached. * Software. Software is often overlooked in the quest ergonomic perfection. The EEC directive made a clear statement about the characteristics of acceptable software, requiring employers to analyse the tasks, which their employers perform and to provide software which makes the tasks easier. IT is also expected to be easy to use and an adaptable to the users experience. Computers can be responsible for a whole raft of health problems, from eyestrain to wrist injuries, back problems to fetal abnormalities, stomach ulcers to mental collapse. Articles appear regularly in the newspaper relating stories of employers who are suing their employers for computer related illnesses. ...read more.


Offences include using pirate copies of software and using software on more machines that are permitted under the terms of the licence. A few ways in which a compute user could protect the computer from hackers and viruses are: - * Having a fire wall on the computer to stop hackers from invading the computer * Have the password for the computer changed regularly, this is because it will stop people from guessing the password easily * Have an anti-virus program on the computer, this detects and cleans the computer from most viruses as long as it is up to data. The rights to privacy are a fundamental human right and one that we will take for granted. Most of us for instance, would not want our medical records freely circulated, and many people are sensitive about revealing their age, religious beliefs, family circumstances or academic qualifications. In the UK even the use of a name and address files or mail shots are often felt to be an invasion of privacy. With the advent of large computerised databases it became quite feasible for sensitive personal information to be stored without the individual and accessed by, say, a prospective employer, credit card company or insurance company to assess some bodies suitability for employment, credit or insurance. Below is the data protection Act that must be followed by all companies. * Fairly and Lawfully processed * Processed for a limited purpose * Adequate, relevant and not excessive * Accurate * Not kept longer than necessary * Processed in accordance with the data subjects rights * Secure * Not transferred to countries without adequate protection. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Marked by a teacher

    STELLA Science Simulation Software.

    The first parameter I change is the mass of pendulum. From picture 2 above, graph 1 is the oscillation at normal condition (mass=1kg, initial displacement=0.1m and string length=1.0m), graph 2 at the mass of pendulum is half the initial mass of pendulum of normal condition (mass=0.5kg, initial displacement=0.1m and string length=1.0m)

  2. Analysis of market, environmental forces, competitors, marketing mix and consumer implementation.

    Attempt to establish the console as the digital centre of the living room, incorporating different other devices as CD and DVD-Player. Increasing importance of gaming and online communities for social contact. Ability to compete against any other player anywhere at any time via Internet creates a continuous challenge to the gamer, hooks him.

  1. Free essay

    Data Protection

    * When there's media failure, it gets you in into a real dilemma, especially if you're the type that doesn't back up. * Reasons why media failure occurs it could be due to several reasons such as: * the hard disk drive malfunctioning * The power supply unit failing: this

  2. Database Design

    (Test No.4) Once I open the Customer Details form, I go to a record and click on the 'Delete Record' button. When I click on this, the following message pops up. I simply click Yes then the record will be deleted .

  1. An analytical report to discuss the HEG Infoway project, its implementation and the reasons ...

    It was good project to do, and the fact that they tried to do that in the latest technology made it even more interesting. But the whole idea of it was wrong. As BIL decided to do that just to give favour to its group company.

  2. Designing a booking system for an Estate Agent.

    Have you ever dealt with a double booking? Not that I know off but maybe with my other colleagues as sometimes it is difficult because the booking information isn't written down on the diary. We have to rely on our memory and organisation skills.

  1. Planning a payroll system for a martial arts school.

    * What does the company do? We teach mix martial arts sports such as Kickboxing and Thai Taekwondo * How old is your business? 11 years. * Do you make enough turnover? We make more than enough turnover which is why we need the new ICT system.

  2. ICT Security Report

    And hundreds of coming being `forced to be closed done due to their customers' details dissolving. Another example of this happening were when both the primary site and recovery site of Jefferson Parish both being hit causing large amounts of damage in New Orleans due to Hurricane Katrina in 2005.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work