13 privacy n health.ppt compatibility mode copy
TRANSCRIPT
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
1/30
Pertemuan 13
Understanding ComputersPrivacy & Health Concerns
1
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
2/30
Learning Outcomes
Pada akhir pertemuan ini, diharapkan mahasiswa
akan mampu :
menunjukkan pentingnya privasi informasi
serta kesehatan pengguna komputer
2
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
3/30
Outline Materi
System Failure & Backup
Ethics and Society
Information Privacy
Health Concerns of Computer Use
3
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
4/30
System Failure
What is a system failure?
4
Undervoltagedrop
in electrical supply
Overvoltage orpower surge
significant increase
in electrical power
Noiseunwanted
electrical signal
Caused by aging hardware,Caused by aging hardware,
natural disasters, or electricalnatural disasters, or electrical
power disturbancespower disturbances
Can cause loss of hardware,Can cause loss of hardware,
software, or datasoftware, or data
Prolonged malfunctionProlonged malfunction
of computerof computer
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
5/30
System Failure
What is a surge protector?
5
Protects computer and
equipment from electrical power
disturbances
Uninterruptible power supply(UPS) is surge protector that
provides power during power loss
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
6/30
Backing Up The Ultimate
Safeguard
What is a backup?
6
Duplicate of file, program, or disk
Full backupFull backup
all files in
computer
Full backupFull backup
all files in
computer
Selective backupSelective backup
select which files
to back up
Selective backupSelective backup
select which files
to back up
ThreeThree--generationgeneration
backupbackup
preserves
three copies of
important files
ThreeThree--generationgeneration
backupbackup
preserves
three copies of
important files
In case of system failure or corrupted files,
restore files by copying to original location
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
7/30
Internet Security Risks
What is a denial of service attack?
7
Computer Emergency
Response Team Coordination
Center (CERT/CC) assistswith DDoS attacks
Hacker uses unsuspecting
computer, called zombie, to
execute attack on other systems
Distributed DoS (DDoS) attack
is more devastating DoS attack
in which multiple computersattack multiple networks
Also called DoS attack
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
8/30
Internet Security Risks
How do Web browsers provide secure datatransmission?
8
Secure siteSecure siteis Web site that uses
encryption to secure data
Digital certificateDigital certificate is notice that
guarantees Web site is legitimate
Many Web browsers
use encryption
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
9/30
Internet Security Risks
What is a certificate authority (CA)?
9
Authorized person
or company that
issues and verifies
digital certificates Users apply for
digital certificate
from CA
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
10/30
Internet Security Risks
What is Secure Sockets Layer (SSL)?
10
Provides encryption of all data that passes between
client and Internet server
Web addresses
beginning withhttps indicate
secure connections
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
11/30
Internet Security Risks
What are methods for securing e-mailmessages?
11
Digital signature
is encrypted
code attached to
e-mail message
to verify identity
of sender
Freeware for
personal, non-
commercial use
Pretty Good
Privacy (PGP)
is popular
e-mail encryption
program
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
12/30
Ethics and Society
What are computer ethics?
12
Information privacyInformation privacy
Intellectual property
rightsrights to which
creators are entitled for
their work
Intellectual property
rightsrights to which
creators are entitled for
their work
Software theftSoftware theft Information accuracyInformation accuracy
Codes of conductCodes of conduct
Unauthorized use of
computers andnetworks
Unauthorized use of
computers andnetworks
Moral guidelines that govern use of computers and information systemsMoral guidelines that govern use of computers and information systems
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
13/30
Ethics and Society
What is an IT code of conduct?
13
Written guideline that helps determine whether
computer action is ethical
Employers can distribute to employeesIT CODE OF CONDUCT
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
14/30
Information Privacy
What is information privacy?
14
Legal for employers to use
monitoring software programs
Difficult to maintain today
because data is stored online
Employee monitoring is using
computers to observe employee
computer use
Right of individuals and
companies to restrict collection
and use of information about them
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
15/30
Information Privacy
What are some ways to safeguard personal
information?
15
Fill in necessary information
on rebate, warranty, and
registration forms
Avoid shopping cluband buyers cards
Install a cookie manager
to filter cookies
Inform merchants that you
do not want them to distribute
your personal information
Limit the amount of information
you provide to Web sites; fill
in only required information
Clear your history file when
you are finished browsing
Set up a free e-mail account;
use this e-mail address for
merchant forms
Turn off file and print sharing
on your Internet connection
Install a personal firewall
Sign up for e-mail
filtering through your
Internet service provider or
use an antispam program,
such as Brightmail
Do not reply to spam
for any reason
Surf the Web anonymously
with a program such asFreedom Web Secure or
through an anonymous
Web site such as
Anonymizer.com
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
16/30
Information Privacy
What is an electronic profile?
16
Data collected when you fill out form on Web
Merchants sell
your electronic
profile Often you can
specify whether
you want
personal
information
distributed
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
17/30
Information Privacy
What is a cookie?
17
Set browser to
accept cookies,
prompt you to
accept cookies,
or disable
cookies
Some Web sites
sell or trade
informationstored in your
cookies
Small file on
your computer
that contains
data about you
User
preferences
Interests
andbrowsing
habits
How
regularly
you visit
Web sites
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
18/30
Information Privacy
How do cookies work?
18
Step 1. When you type Web
address of Web site in your
browser window, browser
program searches your hard
disk for a cookie associated
with Web site.
Step 2. If browser finds a
cookie, it sends information in
cookie file to Web site.
Step 3. If Web site does not receive
cookie information, and is expecting it,
Web site creates an identification number
for you in its database and sends thatnumber to your browser. Browser in turn
creates a cookie file based on that number
and stores cookie file on your hard disk.
Web site now can update information in
cookie files whenever you access the site.
Web server for
www.company.com
http://www.company.com/http://www.company.com/ -
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
19/30
Information Privacy
What is a cookie manager?
19
Software program that selectively
blocks cookies
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
20/30
Information Privacy
What are spyware and spam?
20
Spyware is program
placed on computer
without users
knowledge Secretly collects
information about user Spam is unsolicited
e-mail message sent
to many recipients
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
21/30
Information Privacy
How can you control spam?
21
Collects spam in
central locationthat you can
view any time
Service that
blocks e-mail
messages fromdesignated
sources
EE--mail filteringmail filtering
Sometimes
removes valid
e-mail messages
Attempts to
remove spam
AntiAnti--spam programspam program
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
22/30
Information Privacy
What privacy laws have been enacted?
22
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
23/30
Information Privacy
What privacy laws have been enacted?(contd)
23
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
24/30
Information Privacy
What is content filtering?
24
Process of restricting access to certain material
Internet Content Rating
Association (ICRA)
provides rating systemof Web content
Web filtering software
restricts access to
specified sites
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
25/30
ea oncerns o ompu er
Use
What are some health concerns ofcomputer use?
25
Computer vision syndromeComputer vision syndrome
(CVS)(CVS)eye and visioneye and vision
problemsproblems
Computer vision syndromeComputer vision syndrome
(CVS)(CVS)eye and visioneye and vision
problemsproblems
Repetitive strain injury (RSI)Repetitive strain injury (RSI)Repetitive strain injury (RSI)Repetitive strain injury (RSI)
Computer addictionComputer addictionwhenwhen
computer consumes entirecomputer consumes entire
social lifesocial life
Computer addictionComputer addictionwhenwhen
computer consumes entirecomputer consumes entire
social lifesocial life
TendonitisTendonitisinflammation ofinflammation of
tendon due to repeated motiontendon due to repeated motion
TendonitisTendonitisinflammation ofinflammation of
tendon due to repeated motiontendon due to repeated motion
Carpal tunnel syndromeCarpal tunnel syndrome(CTS)(CTS)inflammation of nerveinflammation of nerve
that connects forearm to palmthat connects forearm to palm
Carpal tunnel syndromeCarpal tunnel syndrome(CTS)(CTS)inflammation of nerveinflammation of nerve
that connects forearm to palmthat connects forearm to palm
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
26/30
ea oncerns o ompu er
Use
What precautions can prevent tendonitis orcarpal tunnel syndrome?
26
Take frequent breaks during computer session
Use wrist rest
Exercise handsand arms
Minimize number
of times you switch
between mouse and
keyboard
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
27/30
ea oncerns o ompu er
Use
How can you easeeyestrain whenworking at the
computer?
27
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
28/30
ea oncerns o ompu er
Use
What is ergonomics?
28
Applied science devoted to comfort, efficiency, and
safety in workplace
keyboard
height: 23
to 28
feet flat on floor
adjustable
height chair
with 5 legs
for stability
adjustable
seat
adjustable
backrest
elbows at 90
and arms and
hands parallel
to floor
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
29/30
ea oncerns o ompu er
Use
What is green computing?
29
Reducing electricity and environmental waste while
using computer
-
7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy
30/30
Source : Shelly, Gary B. DiscoveringComputers (2004/2005/2006). Thomson
Course Technology. PPT for Chapter 11.
30