CH 10 Privacy and Security
CH 10 Privacy and Security
CH 10 Privacy and Security
B. Introduction pg 269
Because of human nature, computers systems may be used for both good and bad purposes. Some questions to look at include: What are the consequences of the widespread use of computing technology? Does technology make it easy for others to invade our personal privacy? Does technology make it easy for other to invade the security of business organizations like our banks or our employees? Competent end users need to be aware of the potential impact of technology on people and how to protect themselves on the Web. They need to be sensitive to and knowledgeable about personal privacy, organizational security, ergonomics, and the environmental impact of technology. CE_IM10-1
C. People pg 268
People are one key component of information systems, the others including procedures, software, hardware, and data. Most everyone would agree that technology has had a very positive impact on people, but there are some negative impacts as well. Some of these negative concerns include:
a) Privacy
What are the threats to personal privacy and how can we protect ourselves
b) Security
How can access to sensitive information be controlled and how can we secure hardware and software?
c) Ergonomics
What are the physical and mental risks of using technology, and how can these risks be minimized?
d) Environment
What can individuals and organizations do to minimize the impact of technology on our environment?
D. Privacy pg 269
Ethics are standards of moral conduct Computer ethics are guidelines for the morally acceptable use of computers in our society Four primary computer ethic issues include:
a) Privacy
b) Accuracy
Relates to the responsibility of those who collect data to ensure that the data is correct
c) Property
d) Access
Relates to the responsibility of those who have data to control and who is able to use that data
CE_IM10-2
2. Large Databases
Every day, data is gathered about us and stored in large databases The federal government alone has over 2,000 databases Our Social Security number has become a national identification number Information resellers (aka information brokers) make up an entire industry that collects and sells personal data. Electronic profiles are built containing highly detailed and personalize descriptions of individuals Some concerns involve the possibility of:
a) Identity theft
The illegal assumption of someones identity for the purposes of economic gain
b) Mistaken identity
The electronic profile of one person can be switched with another. The Freedom of Information Act entitles you to look at information kept by credit bureaus and government agencies
3. Private Networks
Snoopware is software that allows organizations to search electronic mail and files One survey found nearly 75% of all businesses have done this Some argue that these are private networks, and the owners can do what they want Others argue that the U.S. is becoming a nation linked by electronic mail, therefore the government has to provide protection for users against other people reading or censoring messages
Illusion of anonymity is the problem when people believe they are safe from others invading their personal privacy Many organizations monitor the email sent and received on their servers Some individuals eavesdrop on e-mail sent over the web Your use of the Web may be monitored, including the creation of a history file including a list of all the sites youve visited Cookies are special files that capture information about the web sites that you visit. Two basic types include:
a) Traditional cookies
CE_IM10-3
Monitor activities across all sites you visit Examples include DoubleClick and Avenue A Programs called cookie cutter programs help to filter out these bad cookies Spyware is software that are designed to secretly record and report on an individuals activities on the Internet. Adware is just one type of spyware
Most information collected by non-governmental organizations is NOT covered by existing laws The Code of Fair Information Practice has been established to encourage organizations to follow its recommended practices
This section briefly describes how you can install software to help remove spyware. An example of software from http://www.lavasoftusa.com is listed.
1. Getting started
3. Staying up to Date
F. Security pg 276
1. Computer criminals
Computer crime is an illegal action which the perpetrator uses special knowledge of computer technology. Five types of computer criminals include:
a) Employees
CE_IM10-4
b) Outside users
Hackers are people who gain unauthorized access to a computer for the fun and challenge of it Crackers do the same for malicious reasons A bomb is a destructive computer program put into a system
d) Organized crime
Use computers just like legitimate businesses, only for illegal purposes Counterfeiters and forgers use computer technology
e) Terrorists
2. Computer crime
a) Malicious programs
(1) Viruses
Programs that migrate through networks and operating systems most attach themselves to programs and databases Computer Abuse Amendments Act of 1994
(2) Worms
Special type of virus that doesnt attach itself to programs or databases, but fills a system with self replicating information
b) Denial of Service
Like a worm, it attempts to slow down a system DoS attacks flood a system with requests for information or data, typically via the Internet
CE_IM10-5
c) Internet Scams
A scam is a fraudulent or deceptive act or operation designed to trick an individual into spending their time or money for little or no return An Internet scam is a scam using the Internet
d) Theft
Can take many forms, including theft of hardware, software, data or computer time Software piracy is the unauthorized copying of programs for personal gain The Software Copyright Act of 1980 says it IS LEGAL to make a backup copy of software, however, these copies may NOT be sold or given away
e) Data Manipulation
Finding entry into a system and leaving a message may seem like a prank, but it IS AGAINST the law Computer Fraud and Abuse Act of 1986 makes it a crime for unauthorized persons to view, copy, or damage data using any computer across state lines. It also prohibits the unauthorized use of any federal (or federally insured financial institutions) computer.
3. Other Hazards
a) Natural Hazards
Fires, floods, wind, hurricanes, tornadoes, earthquakes all require remote backup and redundancy plans
c) Technological failure
Hardware and software will fail, so you need plans for this contingency Surge protectors can help protect against voltage surges (aka spikes)
d) Human errors
CE_IM10-6
Security is concerned with protecting information, hardware, and software which much be protected from both man made and natural disasters. Some techniques used to protect computer systems include:
a) Encrypting messages
Encoding messages and data so it can not be read by someone without the decoding scheme
b) Restricting access
Keep unauthorized people away from systems by using some things as: Biometric scanning devices such as fingerprint or retinal (eye) scanners Passwords secret words or codes that must be entered to access the system Firewalls hardware and software that acts as a security buffer between the corporations private network and all external networks, including the Internet
c) Anticipating disasters
Physical security: protecting hardware from human and natural disasters Data security: protecting software and information from unauthorized tampering or damage Disaster Recovery Plans: contingencies for continuing operations during an emergency until normal operations can be restored Hot sites: fully equipped backup computer centers Cold sites: building with hook ups, but no equipment
d) Backing up data
Equipment can usually be replaced, but data may be irreplaceable Data should be encrypted if sent over networks, restricted from unauthorized viewing and modification, and backed up at a remote location
G. Ergonomics pg 282
Ergonomics is the study of human factors related to things people use It is concerned with fitting the job to the working rather than forcing the worker to contort to fit the job
CE_IM10-7
1. Physical Health
Take a 15 minute break every hour or two Avoid computer screens that flicker Screen should be 3-4 times brighter than the background light
Make sure tables and chairs are adjustable Monitor should be at or slightly below eye level Keyboards should be detachable Use a footrest to avoid leg strain
RSI (aka cumulative trauma disorder) is a name given to a number of injuries Carpal tunnel syndrome consists of damage to nerves and tendons in the hands May use ergonomically designed keyboards, take breaks and rests from working on computers
2. Mental Health
a) Noise
Women have been found to be more sensitive to noisy conditions, especially high pitched equipment noises Use head mounted microphones and earphones, as well as room soundproofing to reduce noise
b) Electronic monitoring
Research shows that people suffer more from electronic surveillance than from human Fed Ex and Bell Canada removed some electronic surveillance and found that productivity went up Technostress is the tension that arises when we have to unnaturally adapt to computers rather than having computers adapt to us
3. Design
less may be more when it comes to computer design some people prefer fewer features if the system is easier to use.
CE_IM10-8
Microcomputers use 5% of the electricity used in the workplace The Environmental Protection Agency (EPA) has created the Energy Star program to discourage waste in the microcomputer industry. The microcomputer industry has responded with the Green PC to address the reduction of power consumption by computers
1. The Green PC
a) System Unit
Use an energy saving microprocessor Employ microprocessor and hard drives that switch to sleep mode when not in operation Replace supply unit with an adapter that uses less electricity Eliminate the cooling fan
b) Display
Use flat panel displays (which use less electricity than CRT) Use power-down monitors Use screen saver software that clears the display
c) Manufacturing
Reduce the amounts of chlorofluorocarbons (CFCs) in the manufacturing process Other toxic chemicals and metals (nickel, other heavy metals) are removed from the manufacturing process
2. Personal Responsibility
a) Conserve
EPA estimates 30-40% of computers are left on all the time EPA estimates that 80% of the time no one is looking at a monitor You can use a screen saver to help save energy
b) Recycle
You can recycle paper, ink cartridges, packaging materials, as well as computer components yourself
c) Educate
You can learn more on how to recycle, and encourage others to do the same
CE_IM10-9
Presence Technology Makes Finding People Easy. Researchers are developing technology to alert others when you are doing something, such as watching TV, in your car, etc. Advantage is people would know the best way to reach you Disadvantage is people would always know what you are doing.
CE_IM10-10
4. Security
a) Physical Health
(1) Eyestrain and headache (2) Back and Neck pain (3) Repetitive Strain Injury (RSI)
b) Mental Health
(1) Noise (2) Stress/Technostress
c) Design
6. The Environment
a) The Green PC
(1) System units (2) Display units (3) Manufacturing process
b) Personal Responsibility
(1) Conserving energy (2) Recycling (3) Educating
CE_IM10-11
CE_IM10-12
41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59
Privacy Property repetitive motion injury repetitive strain injury Scam Security Snoopware Software Copyright Act o f1980 software piracy Spike Spyware surge protector Technostress traditional cookie Trojan horse Virus virus checker voltage surge Worm
RSI
269 269 283 283 278 280 271 278 278 279 272 279 284 272 278 277 278 279 277
a) Across
4 5 7 8 11 12 14 16 17 18 19 20 22 24 26 28 29 ETHICS ENCRYPTING WORM HACKER PROPERTY MISTAKEN ACCURACY SPYWARE PASSWORD CRACKER SECURITY BIOMETRIC ENERGYSTAR DOS (Denial of Service) DATASECURITY HOTSITE SNOOPWARE PG 269 PG 280 PG 277 PG 277 PG 269 PG 271 PG 269 PG 272 PG 280 PG 277 PG 280 PG 280 PG 285 PG 278 PG 281 PG 281 PG 271
CE_IM10-13
b) Down
1 2 3 4 6 9 10 13 14 15 21 23 25 27 PIRACY TECHNOSTRESS FIREWALL ERGONOMICS GREENPC CHLOROFLUOROCARBONS VIRUS PRIVACY ADWARECOOKIE COLDSITE IDENTITY (Information) RESELLERS EXCESS SPIKE PG 269 PG 284 PG 280 PG 282 PG 285 PG 286 PG 277 PG 269 PG 272 PG 281 PG 270 PG 270 PG 269 PG 279
2. Multiple Choice
1 2 3 4 5 6 7 8 9 1 0 B A D E C A B A C B Accuracy Privacy Spyware Employees Security Physical Security Ergonomics RSI Technostress Green PC Pg 269 Pg 269 Pg 272 Pg 276 Pg 280 Pg 281 Pg 282 Pg 283 Pg 284 Pg 286
3. Matching
TERM ethics property scam snoopware illusion of anonymity cookie ad network cookies cookie cutter program computer crime hacker cracker viruses worm MATCH J N O P M D A E C L F S T NUMBER 1 2 3 4 5 6 7 8 9 10 11 12 13 HINT Standards of moral conduct Relates to who owns data and rights to software Fraudulent or deceptive Internet operation designed to trick individuals Programs that record virtually every activity on a computer system Belief that there is little threat to personal privacy via the Internet Specialized programs that record information on Web site visitors Cookies that continually monitor Web activity and report information back to marketing organizations Program that blocks the most intrusive ad network cookies Illegal action involving special knowledge of computer technology Persons who gains unauthorized access to a computer system for the fun and challenge of it Person who gains unauthorized access to a computer system for malicious purposes Hidden instructions that migrate through networks and operating systems and become embedded in different programs Fills a computer system with self-replicating information PAGE 269 269 278 271 272 272 272 272 276 277 277 277 277
CE_IM10-14
G R Q I K H B
14 15 16 17 18 19 20
4. Open-ended
Every day, data is gathered about us and stored in large databases The federal government alone has over 2,000 databases Our Social Security number has become a national identification number Information resellers (aka information brokers) make up an entire industry that collects and sells personal data. Electronic profiles are built containing highly detailed and personalize descriptions of individuals Some concerns involve the possibility of:
b) Discuss the Code of Fair Practice. Why has this practice not been made into law?
The Code of Fair Practice is a set of guidelines established by former Secretary of Health, Education, and Welfare Elliot Richardson. It addresses a number of privacy concerns, and is supported by many privacy advocates. CE_IM10-15
The fact that it is not law can be argued for a variety of reasons, some political. See pg 273
Several types can include employees, outside users, hackers and crackers, organized criminals, and terrorists See pg 276-277
d) What are the principal measures used to protect (provide?) computer security? What is encryption? How is it used by corporations and individuals?
Some methods include using encrypted messages, restricting access via login/password combinations, biometric scanning, and firewalls, anticipated disasters, and backing up data Encryption takes an email message and scrambles it so it is unreadable by anyone but the intended recipient Both corporations and individuals can send email this way, including the use of Pretty Good Privacy (PGP) See page 280
e) What is ergonomics? How does computer use impact mental health? Physical health? What steps can be taken to alleviate technostress? What is ergonomic design?
Ergonomics is the study of human factors related to things people use. Impacts on mental health can include noise, electronic monitoring, and technostress Impacts on physical health can include problems with eyestrain and headaches, back and neck pain, and repetitive strain injuries such as Carpal Tunnel Syndrome. Steps to alleviate technostress include trying to adapt computers to users rather than the other way around. Other ways to reduce stress include taking breaks, using ergonomically designed equipment, and eliminating electronic monitoring See pages 284-285
CE_IM10-16
2. Ergonomic Workstations
Have students search the web to find information about the Computer Assisted Passenger Pre-screening System (CAPPS). Discuss the usefulness of such a system what are the advantages and disadvantages of using this in terms of security and privacy.
Students are asked to write a one page paper titled Firewall Security and answer questions discussed in the text, such as a) Define firewall, etc.
2. Plagiarism
Students are asked to write a one page paper titled Plagiarism and answer questions discussed in the text, such as a) How is copying another persons work easier, etc.
a) Privacy
b) Accuracy
Relates to the responsibility of those who collect data to ensure that the data is correct
c) Property
CE_IM10-17
d) Access
Relates to the responsibility of those who have data to control and who is able to use that data
An information broker is an organization that collects and sells information about private individuals Identity theft is the illegal assumption of someones identity for the purposes of economic gain Mistaken identity is the electronic profile of one person can be switched with another. The Freedom of Information Act entitles you to look at information kept by credit bureaus and government agencies, helping you to avoid mistaken identity.
3. What are history files? What are cookies? Describe the two types of cookies.
Your use of the Web may be monitored, including the creation of a history file including a list of all the sites youve visited Cookies are special files that capture information about the web sites that you visit. Two basic types include:
a) Traditional cookies
Monitor your activities at a single site Often used to provide customer service
Monitor activities across all sites you visit Examples include DoubleClick and Avenue A Programs called cookie cutter programs help to filter out these bad cookies Spyware is software that are designed to secretly record and report on an individuals activities on the Internet. Adware is just one type of spyware
The Code of Fair Information Practice has been established to encourage organizations to follow its recommended practices. Note it is not law, but a recommended practice.
CE_IM10-18
B. Ch 10 pg 282
1. Identify five types of computer criminals.
a) Employees
b) Outside users
Hackers are people who gain unauthorized access to a computer for the fun and challenge of it Crackers do the same for malicious reasons A bomb is a destructive computer program put into a system
d) Organized crime
Use computers just like legitimate businesses, only for illegal purposes Counterfeiters and forgers use computer technology
e) Terrorists
a) Malicious programs
(1) Viruses
Programs that migrate through networks and operating systems most attach themselves to programs and databases Computer Abuse Amendments Act of 1994
(2) Worms
Special type of virus that doesnt attach itself to programs or databases, but fills a system with self replicating information
b) Denial of Service
Like a worm, it attempts to slow down a system DoS attacks flood a system with requests for information or data, typically via the Internet
c) Internet Scams
A scam is a fraudulent or deceptive act or operation designed to trick an individual into spending their time or money for little or no return An Internet scam is a scam using the Internet
d) Theft
Can take many forms, including theft of hardware, software, data or computer time Software piracy is the unauthorized copying of programs for personal gain The Software Copyright Act of 1980 says it IS LEGAL to make a backup copy of software, however, these copies may NOT be sold or given away
e) Data Manipulation
Finding entry into a system and leaving a message may seem like a prank, but it IS AGAINST the law Computer Fraud and Abuse Act of 1986 makes it a crime for unauthorized persons to view, copy, or damage data using any computer across state lines. It also prohibits the unauthorized use of any federal (or federally insured financial institutions) computer.
a) Encrypting messages
Encoding messages and data so it can not be read by someone without the decoding scheme
b) Restricting access
Keep unauthorized people away from systems by using some things as: Biometric scanning devices such as fingerprint or retinal (eye) scanners Passwords secret words or codes that must be entered to access the system Firewalls hardware and software that acts as a security buffer between the corporations private network and all external networks, including the Internet CE_IM10-20
c) Anticipating disasters
Physical security: protecting hardware from human and natural disasters Data security: protecting software and information from unauthorized tampering or damage Disaster Recovery Plans: contingencies for continuing operations during an emergency until normal operations can be restored Hot sites: fully equipped backup computer centers Cold sites: building with hook ups, but no equipment
d) Backing up data
Equipment can usually be replaced, but data may be irreplaceable Data should be encrypted if sent over networks, restricted from unauthorized viewing and modification, and backed up at a remote location
C. Ch 10 pg 285
1. What is ergonomics and why is it important?
Ergonomics is the study of human factors related to things people use It is concerned with fitting the job to the working rather than forcing the worker to contort to fit the job
2. Discuss the most significant physical concerns (with computers) and how they can be avoided.
Take a 15 minute break every hour or two Avoid computer screens that flicker Screen should be 3-4 times brighter than the background light
Make sure tables and chairs are adjustable Monitor should be at or slightly below eye level Keyboards should be detachable Use a footrest to avoid leg strain
RSI (aka cumulative trauma disorder) is a name given to a number of injuries CE_IM10-21
Carpal tunnel syndrome consists of damage to nerves and tendons in the hands May use ergonomically designed keyboards, take breaks and rests from working on computers
3. Discuss the most significant mental concerns (with computers) and how they can be avoided.
a) Noise
Women have been found to be more sensitive to noisy conditions, especially high pitched equipment noises Use head mounted microphones and earphones, as well as room soundproofing to reduce noise
b) Electronic monitoring
Research shows that people suffer more from electronic surveillance than from human Fed Ex and Bell Canada removed some electronic surveillance and found that productivity went up Technostress is the tension that arises when we have to unnaturally adapt to computers rather than having computers adapt to us
D. Ch 10 pg 287
1. What is a Green PC?
Microcomputers use 5% of the electricity used in the workplace The Environmental Protection Agency (EPA) has created the Energy Star program to discourage waste in the microcomputer industry. The microcomputer industry has responded with the Green PC to address the reduction of power consumption by computers
a) System Unit
Use an energy saving microprocessor Employ microprocessor and hard drives that switch to sleep mode when not in operation Replace supply unit with an adapter that uses less electricity Eliminate the cooling fan
CE_IM10-22
b) Display
Use flat panel displays (which use less electricity than CRT) Use power-down monitors Use screen saver software that clears the display
c) Manufacturing
Reduce the amounts of chlorofluorocarbons (CFCs) in the manufacturing process Other toxic chemicals and metals (nickel, other heavy metals) are removed from the manufacturing process
3. What other actions can you take to help protect the environment?
a) Conserve
EPA estimates 30-40% of computers are left on all the time EPA estimates that 80% of the time no one is looking at a monitor You can use a screen saver to help save energy
b) Recycle
You can recycle paper, ink cartridges, packaging materials, as well as computer components yourself
c) Educate
You can learn more on how to recycle, and encourage others to do the same
CE_IM10-23
Ch 10 Privacy and Security o Focus of this chapter will be on people, since they are the ones affected by privacy and security issues Ch 10 pg 270 figure 10-2 Large organizations are constantly compiling information about us, such as the kinds of products we buy. o Photo of a shopper using a credit card to purchase items at a grocery store. o The grocer can collect information about the types of products the shopper buys, when it was purchased, etc. to build a profile about this type of shopper. Ch 10 pg 270 figure 10-3 Information resellers web site o Screen shot of http://www.vspy.net a Internet site offering a cyber detective toolkit which can be used to gather electronic information about people Ch 10 pg 271 TIPS box o Lists a few ideas on what to do if you think you have become a victim of identity theft (the illegal assumption of your identity by someone else for economic gain). Tips include Contact local and federal police to report the crime Call the FTC Federal Trade Commissions hotline Visit the ID Theft website at http://www.consumer.gov/idtheft Obtain and file the ID theft affidavit Ch 10 pg 271 figure 10-4 Snoopware o Screen shot of http://winwhatwhere.com website that offers software to help monitor computer activity Ch 10 pg 272 On the Web Explorations o Encourages students to learn more about the Center for Democracy and Technology, which monitors privacy issues and legislation. Ch 10 pg 273 figure 10-5 WebWasher o Screen shot of http://www.webwasher.com a web site that offers cookie cutter programs which help to filter out the most intrusive cookies from operating on your computer Ch 10 pg 273 figure 10-6 Cookie-cutter programs o A list of a few programs that can be used to help eliminate harmful cookies from your computer system. Some of these programs include: AdSubtract adsubtract.com Cooke Cleanup softwadd.com Cookie Crusher thelimitsoft.com Cookie Pal kburra.com WebWasher webwasher.com Ch 10 pg 273 TIPS box o Lists several tips to help protect your privacy on the Web including: Encrypt sensitive e-mail Shield your identity Block cookies Check for spyware CE_IM10-24
Ch 10 Privacy and Security Notify providers Be careful about disclosing private information Ch 10 pg 276 figure 10-7 Principles of the Code of Fair Information Practice o Table listing principles and a brief description including: No secret databases Right of individual access Right of consent Right to correct Assurance of reliability and proper use Ch 10 pg 277 figure 10-8 Commonly encountered viruses o Table listing some viruses and a brief description including: Apology-B follows outgoing email with another containing virus KuKworm automatically attaches to outgoing email Love Bug recreates itself through MS Outlook renames files Stages-A copies itself on all available network drives Thus deletes data on December 13th Ch 10 pg 278 TIPS box o Lists several tips to help avoid getting computer viruses, including: Use an antivirus program Check disks Enable write protection Check all downloads Update your antivirus program Ch 10 pg 279 figure 10-9 Common Internet scams o Table listing a few Internet scams along with a brief description: Identity theft Chain letter Auction fraud Vacation prize Advance fee loans Ch 10 pg 280 figure 10-10 Disasters both natural and manmade can play havoc with computers o Photo of flood disaster Ch 10 pg 280 figure 10-11 Encrypted e-mail o Screen shot of email that has been encrypted so it appears unreadable to anyone with out the decryption code Ch 10 pg 280 On the Web Explorations o Encourages students to learn more about PGP Pretty Good Privacy a leader in the development of encryption programs Ch 10 pg 281 figure 10-12 Biometric scanning devices o Images of a fingerprint scanner and iris (eye) scanner sometimes used to enhance security on a computer system Ch 10 pg 281 figure 10-13 Measures to protect computer security
CE_IM10-25
Ch 10 Privacy and Security o Table listing some steps (and their descriptions) for improving computer security including: Encrypting code messages sent via email Restricting limit access via passwords, dial-back, firewalls Anticipating plan for disasters Backing up copy data and store it remotely Ch 10 pg 282 TIPS box o List of suggestions to improve security on a home PC system Avoid extreme conditions heat, cold, use surge protector Avoid viruses use an updated utility Avoid attachments dont run email attachments Install firewall block unwanted IP traffic Update software get update patches for system software Guard the computer protect it from theft Guard programs and data lock disks, back up files, etc. Ch 10 pg 282 On the Web Explorations o Encourages students to learn more about Workplace Designs, a distributor of ergonomic equipment Ch 10 pg 283 figure 10-4 Recommendations for the ideal microcomputer work environment o Diagram of some recommendations including: Good lighting Adjustable height table Wrist rest Adjustable backrest on chair Footrest if needed Adjustable tilt and swivel monitor Adjustable bi-level table Table height should be 25-29 inches Ch 10 pg 283 On the Web Explorations o Encourages students to learn more about computer related eyestrain from the Mayo Clinic and the American Optometric Association Ch 10 pg 283 figure 10-15 Back and neck pain o Pain can be caused by monitors and keyboards that are in the wrong position Ch 10 pg 284 figure 10-16 Carpal tunnel syndrome o Image of end users hands near a computer keyboard o A RSI (Repetitive Strain Injury) that can be caused by overuse of computer keyboards Ch 10 pg 284 figure 10-17 Ergonomic keyboard o Photo of a specially designed (curved) keyboard which may help to reduce the number of Repetitive Strain Injuries from using computers Ch 10 pg 285 figure 10-18 Summary of ergonomic concerns
CE_IM10-26
Ch 10 Privacy and Security o Table listing some concerns and prevention techniques, including: Eyestrain and headache take breaks Back and neck pain use adjustable equipment RSI use ergonomic equipment, take breaks Noise use head mounted headphones and microphones Stress from excessive monitoring remove it Ch 10 pg 286 figure 10-19 The Green PC o Image of a green PC (environmentally friendly PC) including: Flat panel display with power down option System unit with low energy requirements and no cooling fan Energy saving CPU and HD with sleep mode capability Ch 10 pg 287 figure 10-20 Discarded computer components o EPA estimates 30-40% of computers are left running night & day, and on weekends, as well as up to 80% of the time the monitor is on, no one is looking at it o Many computer components can be recycled Ch 10 pg 287 figure 10-21 Computer recycling groups o Table listing a few recycling groups including: Computers for schools association http://www.detwiler.org Computers for youth www.cfy.org National cristina foundation www.crisiank.org Share technology www.sharetechnology.org
CE_IM10-27