• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

People and IT

Extracts from this document...

Introduction

People and IT Ever since industrial revolution, people have feared that machinery will replace workers, and Information Technology us no exception. In spite of dire predictions, however, there is no evidence that the introduction of computers has led to mass unemployment - in fact, over computers have created all more jobs than have been replaced by them. Nevertheless, in some areas computers have substantially replaced the workforce. In the 1980s, thousands of factory workers were made redundant by the introduction of robots on the factory floor making everything from biscuits to cars. In the 1990s, thousands of clerical and white-collar workers saw their Jobs disappear with the introduction of company databases, desktop publishing, computerised accounting systems and increased automation in banks, building societies and organisations of all kinds, large and small. Teleworking involves carrying out work away from the office and communicating with the employer through the use of a computer and telecommunications equipment. Often Tele-workers are based at home, but they can also work from Telecentres, satellite offices or even on the move. Although a study done in 1995 at Newcastle University found that less than 1 worker out off 100 was a Teleworker (spending at least half of their working week at home using the computer), organisation are becoming increasingly interested in various forms of Teleworking, which are becoming increasingly interested in various forms of Teleworking, which has benefits both for the employer and the employee. According to research done by Henley Business School in 1997, there are already 4 million Teleworkers in the UK. ...read more.

Middle

The office should be well lit. Computers should neither face windows or back into a window so those users have to sit with the sun in their eyes. Adjustable blinds onto a window should be provided. * Furniture. Chairs should be adjustable height, with a backrest, which tilts to support the user at work and at rest, and should swivel on a five-point base. It should be at the correct height relative to a keyboard on the desk. * Work space. The combination of chair, desk and computer accessories (such as document holders, mouse ad mouse mats, paper trays and so on), lighting, heating and ventilation all contribute to the workers over all well being. * Noise. Noisy printers, for example, should be given covers to reduce the noise or position in a different room. * Hardware. The screen must tilt and swivel and be flicker-free, the keyboard must be separately attached. * Software. Software is often overlooked in the quest ergonomic perfection. The EEC directive made a clear statement about the characteristics of acceptable software, requiring employers to analyse the tasks, which their employers perform and to provide software which makes the tasks easier. IT is also expected to be easy to use and an adaptable to the users experience. Computers can be responsible for a whole raft of health problems, from eyestrain to wrist injuries, back problems to fetal abnormalities, stomach ulcers to mental collapse. Articles appear regularly in the newspaper relating stories of employers who are suing their employers for computer related illnesses. ...read more.

Conclusion

Offences include using pirate copies of software and using software on more machines that are permitted under the terms of the licence. A few ways in which a compute user could protect the computer from hackers and viruses are: - * Having a fire wall on the computer to stop hackers from invading the computer * Have the password for the computer changed regularly, this is because it will stop people from guessing the password easily * Have an anti-virus program on the computer, this detects and cleans the computer from most viruses as long as it is up to data. The rights to privacy are a fundamental human right and one that we will take for granted. Most of us for instance, would not want our medical records freely circulated, and many people are sensitive about revealing their age, religious beliefs, family circumstances or academic qualifications. In the UK even the use of a name and address files or mail shots are often felt to be an invasion of privacy. With the advent of large computerised databases it became quite feasible for sensitive personal information to be stored without the individual and accessed by, say, a prospective employer, credit card company or insurance company to assess some bodies suitability for employment, credit or insurance. Below is the data protection Act that must be followed by all companies. * Fairly and Lawfully processed * Processed for a limited purpose * Adequate, relevant and not excessive * Accurate * Not kept longer than necessary * Processed in accordance with the data subjects rights * Secure * Not transferred to countries without adequate protection. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Marked by a teacher

    The Internet is an important part of our everyday lives however it is not ...

    4 star(s)

    It is so overwhelming having all this information presented to you and you have to now sort through it and figure out what information is true and reliable as opposed to information which could be bias and inaccurate. Some sites are neglected and not updated on a regular basis leaving one with information that is irrelevant and outdated.

  2. Analysis of market, environmental forces, competitors, marketing mix and consumer implementation.

    Attempt to establish the console as the digital centre of the living room, incorporating different other devices as CD and DVD-Player. Increasing importance of gaming and online communities for social contact. Ability to compete against any other player anywhere at any time via Internet creates a continuous challenge to the gamer, hooks him.

  1. Designing a booking system for an Estate Agent.

    These forms should be able to be operated by mainly clicking buttons. To act as confirmation slips and timetables, reports would need to be produced. The main requirement that the client is asking is to prevent double booking. The details above are the main components of the booking system.

  2. Database Design

    (Test No.2) Here I opened my Main Menu form and click the Exit button near the bottom. It then closed the form and returned to this screen. (Test No.3) I opened the Customer Details form, and then I clicked on the 'Add Record' button It then takes me to a blank form where I can type in new customer details.

  1. Free essay

    Data Protection

    Installing a firewall or using the firewall that's built into Windows Vista and Windows XP provides a helpful defence against these hackers. Update your software: Always ensure you have automatic updating turned on and that you've downloaded and installed all the latest critical and security updates.

  2. ICT Security Report

    The only real way that this form of internal threat can be stopped is by having the company put on training for staff stating how important it is that they much get address correct and input correct data. They could repeat this process numerous times within the year to make sure it sticks with their employees.

  1. Part A of this report will aim to firstly define the Capability Maturity Model ...

    In conclusion lack of theory informing the conceptualization of the Capability Maturing Model stages raises questions about the rationale for the suggested sequencing to develop process capabilities. Limited attention has been devoted to define process management, identify and define its constitutive dimensions, and develop reliable and valid measurement instruments for each of these dimensions.

  2. In the U.K there has been a major push for the introduction of national ...

    Biometrics work to measure a unique feature or pattern found on the body in a non-invasive fashion, ruling out forensic based practices such as DNA testing. Biometrics rest on the ability of a computer sensor and computer algorithm, through probabilistic means to apprehend a unique individual pattern found on the body - a fingerprint, or image of an iris.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work