Professional Documents
Culture Documents
o employment issues
o increased leisure time
o changing working patterns
o security and privacy of data
o health and safety issues.
Online services
We can use the Internet in many ways. It is very useful for finding out information about a
number of different topics its also be used by companies to provide services for users of the
Internet.
There are different types of online services, but these can be broken down into main three
areas:
In order to carry out these activities, Internet users need some basic hardware and software.
In terms of hardware they need to have a personal computer with a modem.
The only software they need is an Internet browser.
There are now available in many ways. For example, at local government level in the UK, people
can pay their council tax, parking fines and many more items. There are other services which can
be paid for at national level, such as car tax.
Other services are just for information and are not, therefore, transactions, for example:
There are many other examples of online services that would not be called transactions,
such as:
Customers arranging for packages to be picked up and delivered to a destination of their
choice- for a fee
People filling in their tax returns and making tax payments
Reserving and renewing library books.
Online shopping
It is important at this stage to explain the distinction between the Internet and the worldwide
web. The Internet is often defined as being a network of computer networks connected together
by routers, and can be thought of as the cabling and connectors as well as the computers
themselves.
The worldwide web is just one aspect of the Internet, along with e-mail, file transfer and so on.
It is a collection of hypertext documents; menus etc., often in HTML format. It is an information
retrieval system that needs a web browser to access it. The worldwide web was invented by Tim
Berners-Lee, an Englishman, in 1989 while he was working at CERN, a scientific research
centre in Switzerland. The first website built was at http:\\info.cern.ch/ and was put online on 6
August 1991.
The first instance of companies allowing their customers to purchase products using the Internet
happened in 1994, when Pizza Hut offered customers the opportunity to order pizzas on its web
page. Amazon was founded as an online bookshop in 1995 and now operates separate online
shopping sites in Canada, China, France Germany, Japan, the UK and the USA. According to a
recent Amazon statement, the company currently ships items to 217 countries.
An online shop can be called by other names such as Internet shop, web shop or online store.
It is an electronic commerce (c-commerce) application that businesses can use with each other
or they can offer services or goods directly to the customer.
Although it saves customers the cost of travelling to the shops, online shops tend to charge
delivery or postage costs, which reduce, or even remove, the advantages of not having any
travelling costs.
The purchase of goods from a foreign country can also be problematic. The monetary exchange
rate between two countries can rise, so what may appear to be a good bargain when the goods
were purchased may turn out to be more expensive when the payment is actually made.
Another problem is that the country where the customer lives may impose some sort of tax on
the goods when they are shipped into the country, resulting in the customer paying even more.
As in a real shop, the contents of the basket can be added to, removed or changed. When the
customer has decided that they have finished shopping and they want to pay, they go to the
checkout.
However, customers who have already registered with the shop on a previous visit just need to
log on using their username and password, rather than entering the above data.
Another step is to choose the method of payment. There are several alternatives, but the most
popular is to pay by credit card or debit card. Cheques can be used but this usually means that the
delivery time will be longer, as the shop has to wait for the cheque to clear. It is sometimes also
possible to pay on delivery, but this is not so common as the other methods.
Another step is for the customer to choose how quickly the goods should be delivered as well as
the method of delivery.
Whatever method is used, the customer usually has to pay a delivery charge in addition to the
price of the goods.
The final steps are to confirm the order and to log off. All online shops will ask you to confirm
the order you want to place. This will be the last opportunity for the customer to change their
mind and not go through with the order.
Finally, after confirming the order, or not, the customer must log off from the system.
Security issues
If the customers personal data and payment details were intercepted by a hacker they could be
used by the hacker to defraud both the shop and the customer.
The data could be used to log on to the shops computer system and order a large number of
products which can be dispatched to another address other than the credit owners. For this
reason, some online shops will only dispatch to the billing address. The hacker now has
possession of these goods which they can sell on and the shop and the customer are left to
dispute who is responsible and who should pay the bill. Once the hacker has the credit card
details, they can also be used to make purchases at a number of other shops. This is just a small
part of identity fraud.
In order to protect customers, personal data and payment details are encrypted when they are
transferred over the Internet. This means that data is encoded so that anybody who intercepts the
data, such as a hacker, is unable to decipher the meaning of the data. The data can only be
decoded if the receiving network server has the correct encryption key.
Before a shop goes online, it has to have a website with an easy-to-remember domain name that
is related to the business. The domain name or website address will also be used for e-mail. The
company needs a high-specification web server that will operate 24 hours per day.
To operate online, the shop needs to have a method of accepting payments. It will also need a
secure server, shopping cart software and software to keep track of stock and orders. The shop
will need to incorporate into its website a database of product names, descriptions, pricing and
photos.
The online shopping system must allow the administration staff to add, edit and delete
categories, products, manufacturers, customers and reviews. Usernames and passwords are
essential to make the system secure. These staff must be able to contact customers directly via e-
mail. They must also be able to back up and restore the database easily. They will need to have
access to statistics for products and customers, as well as being able to select what to display, and
in what order, in the product list page.
The online shopping system must allow customers to make use of the orders stored in a database,
finding them quickly and easily as well as seeing their order history and being able to maintain
their own accounts. Prospective customers should be able to use a temporary shopping basket if
they are a guest or a permanent shopping basket if they are returning customers.
There will need to be a friendly user interface so that searches and advanced searches can be
carried out easily and allow customers to progress smoothly to the checkout. Finally, customers
should be confident that all transactions are secure.
Online banking
Opening and maintaining bank accounts many customers are using online banking because of the
convenience of banking at any time of day (or night) and the reduced amount of time and fuel
costs incurred when travelling to and from the bank. Security and fraud are issues that are
considered in some detail in Section 3.5.
4 Account details
When the customer selects a particular account, all the recent transactions are listed. A number of
services are now available, although these differ from bank to bank.
Security issues
An example of possible identity fraud runs like this. Sadiq gets a loan from the bank by
pretending to be somebody else, say Rajvinder. Sadiq uses personal information about Rajvinder,
such as address, birth date and bank account number that he has obtained by hacking into a
database. He manages to convince the bank that he is Rajvinder. Sadiq does not pay back the
loan and the bank thinks it is Rajvinder who has taken out the loan. They expect Rajvinder to pay
the loan back. When he cant or wont, this causes him to have a poor credit rating so that he
cannot borrow money himself.
General unemployment
Before looking at the specific effect of offline services on unemployment, it is useful to consider
a few examples of how other aspects of ICT have affected unemployment.
There are many areas where the use of ICT in the fields of business and commerce has generally
caused unemployment. Many car workers have lost their jobs when car manufacturing
companies have introduced the use of robots into factories. Jobs that used to be done by clerical
workers have been replaced by computers; for example, the calculation of payroll, the issuing of
invoices and requests for payment and receipts of payment.
The main reason for these changes has been cost, although there have been other factors.
These are discussed below:
Bank workers
The introduction of online banking has seen a reduction in the need for certain types of worker.
Bank cashiers are now no longer needed in the numbers that used to be required. Both the use of
ATM machines by many customers and the increase in online banking have led to fewer cashiers
being needed.
Shop workers
The use of online shopping has also led to fewer workers being required, so the number of shop
assistants has fallen dramatically. For example, in Europe the number of shop workers who are
unemployed form the second highest group of unemployed workers in the region. In addition,
fewer staff are required to organize stock control, due to the introduction of electronic point of
sales (EPOS) terminals. These use barcode readers to input product data and are often linked to
automated stock control systems.
Part-time working
This is when people only work a limited number of hours.
The use of online services means that there are fewer jobs available but an advantage is that
workers can work less than the normal full-time hours. The number of hours worked can vary
from a few hours a week to just less than full time.
One of the benefits to employers is that these workers can be used at the busier times or a
business. Another is that it can help to retain and attract staff. Also, where fully trained staffs are
retained, this means that the company or business will not have to spend money on training new
people how to do the work. Online services also need call centres or help lines at need to be
available in the evening. Most full-time employees do not like working at these times, so shops
and banks have to employ part-time workers.
One of the benefits for workers is that they can organize their life outside work more easily.
Another is that workers can continue in the job they have been used to doing. If they had to
change jobs they might lose their skills and self-confidence.
There are some problems for workers, however. Part-time workers are less likely to receive in-
work training than their full-time colleagues. Those working part time earn considerably less per
hour than full-time workers. The difference is greatest for women working part time, who earn
just over half the rate per hour that male full-time workers earn. Part-time jobs are still more
common in the lower paid occupations.
Job sharing
Job sharing is where two people share a job that would normally be done by one person. Each
person is paid on a part-time basis but together they do a full-time job. This can be achieved by
one person working specific days, mornings or afternoons and the other person working the days,
mornings and afternoons when the other doesnt, although there may be times when the
employer wants them to work certain times together.
There are benefits for employers. The two workers can have different skills, knowledge and
experience.
the employer can be said to be getting the skills of two workers for the price of one. As with any
part-time worker, they are working fewer hours they may be fresher and more creative. When the
business is particularly busy the employer can get the two workers to work together. For
particular types of job, it doesnt matter that at less busy times neither is working. Obviously, this
does not apply to jobs like customer help, where somebody must always be available. If one
worker is ill or on holiday, part of the job still gets done. Using a job-share arrangement may
mean that workers stay with the business, whereas they might leave if they had to work full time.
As with part-time working, there is no need to spend money on training a new person.
A possible problem for employers is that money may need to be spent on providing an extra desk
or additional equipment. As when employing part-time workers, there may be extra training costs
associated with training both workers and trying to arrange training times to suit all workers may
be difficult.
The benefits for workers are much the same as with part-time working. Additionally, job sharing
can give greater enjoyment at work as problems can be shared with someone else.
However, there are some problems for employees. Managers may not want certain jobs to be
shared. Workers may not get as much job satisfaction if what was considered to be their job
now has to be shared with someone else. A further issue is that those who job share have to be
extremely organized in terms of the handover between them; it can also help if they think in a
similar way.
Flexible working hours
Flexible working hours, or flexitime as it is sometimes called, give workers some choice about
what times of day they work. They can vary them from day to day. They work the same number
of hours each week, but they can choose when to do these hours, providing it fits in with other
workers requirements and also the employers needs.
One benefit for employers is that it can enable businesses to be open for longer during the day.
This is very useful when the business has call centres and wants the phones to operate from say,
eight in the morning until ten at night.
There are a number of benefits for workers. Flexitime allows workers to organize their working
lives to suit their personal needs. Travelling to work can be easier and cheaper if it happens
outside peak times. If workers stay late to finish a job, they can take time off at a later date. If the
job requires great concentration, it can be done at quiet times of day.
There are, however, some problems for employees. It can put extra pressure on some workers if
they are required to work when other workers are not prepared to work.
Working from home
Working from home, sometimes called teleworking, involves employees spending all or some of
their working week at home, using their home as an office. More and more employees are being
allowed to work at home from time to time in order to work without interruption.
One benefit for employers is that less money has to be spent on renting or buying offices. Some
workers have commitments which make it difficult for them to leave their home, for example
having young families, looking after elderly relatives or having disabilities. When employers
allow these people to work from home it means that the company doesnt lose the services of
staff who might otherwise leave.
One problem for employers is that they must make sure that workers are on task and not wasting
time. In general, it is a case of employing strategies that are effective in an office-based situation,
such as setting and monitoring targets and being available to answer any questions and to provide
support.
Advantages to workers
There are obviously benefits for workers.
o They can manage their work and home life more easily.
o It is no longer essential for them to live close to their work.
o They save on transport costs and travelling time.
o They can work hours which suit them.
o
There are also disadvantages:
Some people find it difficult to work without having contact with other people.
They do not see their manager as regularly. This means that they are less able to impress him or
her, and this can affect career prospects.
It is not always easy to find an office space in the home.
Sometimes it is difficult to concentrate on work when distracted by what is going on at home:
O Friends or relatives may drop in for a chat, making it difficult to work.
O Young children at pre-school age demand attention.
O Pets can cause distractions, such as dogs needing to be taken for a walk.
Keeping work documents confidential and secure while travelling from work to home and vice
versa can be hard.
Compressed hours
Compressed hours working involves employees working the same number of hours but over a
shorter number of days. It usually involves working four or four and a half days in a week, or
nine days out often in a period of two weeks.
One benefit for employers is that by giving extra time off it helps to keep employees who might
otherwise leave for the same reasons as with flexitime. Because some workers work longer it
means that the company can operate longer hours. Also, absenteeism is less of a problem because
employees have more time off.
Workers benefit because they earn the same amount of money but work fewer days. They can
also have long weekends if they complete all their working hours by early Friday. A problem
for workers is that by working longer days they can get very tired and not be able to joy their
extra free time.
Ability to move from branch to branch
With many companies having centralized computer systems, it is not as important which office
workers operate from. They will still be able to access their work. This means that employers can
organize it so that they can move employees from a branch that is less busy to one that is busier
at certain times of the week.
When we talk about the confidentiality of personal data we mean that information should only be
seen by those people who are authorized to see it. Keeping data confidential is an essential part
of information security. Encryption is the main ICT technique used to ensure the confidentiality
of data in online systems. Ordinary data is converted into a secret code, so anybody illegally
accessing data will not be able to understand it. They can still do malicious things like deleting
the data but they cannot gain any information from it. To read an encrypt file requires a secret
key or password that enables the person to decrypt it. Unencrypted data is called plain text
encrypted data is referred to as cipher text.
Shop security
User and payment data are encrypted when they are transferred using the Internet. You will not
need to go into much detail for the AS part of the course but you need to understand that there
are public encryption key and private encryption keys. Encryption is explained in more detail in
Chapter 7 for A2 students. Individuals have a public key which they can tell everybody about.
They also have a private key which only they know. Provided you know an individuals public
key, you can use it to encrypt a message to send to them. Only that individual, however, is able to
decrypt it using their private key. Public-key systems are used to encrypt information that is
transmitted using the Internet for payment purposes.
Online banking
Many banking systems do not consider that the use of a single password provides sufficient
protection against the interception of data by hackers. Online banking uses secure sites and all
data transferred using the internet including the password, are encrypted. This makes it very
difficult for an unauthorized person to get any meaningful information after it has been sent.
However, encryption alone does not prevent hackers or fraudsters from gaining access to your
PC at home. Using key-logging software, they can detect the keys you are pressing on the
keyboard. There is also the slight possibility that they can discover your password or even
somebody could steal your password if you are careless enough to write it down.
Many online banking services therefore use additional methods of security.
One method is to use what are called transaction numbers (TANs). These are basically passwords
which are used once only. They are sent to you by your bank either through the post or a more
recent development is you request one on the Internet and the bank sends the TAN to your
mobile phone. It is only valid for a few minutes, thereby reducing the time available for a hacker
to intercept and use it.
Another method is to ask the user to type in only part of their password, such as the second, third
and fifth characters. Every time the user logs in they are asked for a different combination. This
way, a hacker can only get to know part of the password, which is not very useful to them.
What is the point of knowing the second, third and fifth characters if when they log on the
system asks them for the first, fourth and sixth?
A third method
Involves providing customers with a handheld chip and PIN device which is capable of
generating single-use passwords (this is called two-factor authentication or 2FA).
To access their account a customer would need their debit card, its PIN number,
their online security number and the chip and PIN device itself. Once the customer has inserted
their card into the device and entered their PIN number, they will be issued with an Eight-digit
code. This is the password they use to log in to pay somebody and it changes each time the
information is entered.
Online shopping
The same encryption techniques are used for data transmission as are used by banks.
In addition most sites use the https secure prefix to their URL rather than the more common
'http'
The bonus is, however, on the customer to ensure that they are using a reputable, secure online
store. In addition, to show that data is being transmitted using either the secure socket layer
(SSL) or transport layer security (TLS) protocols, there should be a padlock at the bottom of the
site. Both are protocols used in the encryption of messages between a client computer and a
server, although TLS is now taking over from SSL. You will not need to know about these in
detail for your final AS exam, just that they exist. They are explained more in Chapter 7 for A2
students.
It is important that the customer checks the contact details and details of the company to make
sure of its reliability. It is equally important that the store has a privacy policy and that the
customer reads this. If there isnt one or it is too difficult to understand, the customer should go
to another store. It is important to know what exactly they are agreeing to buy. Both the
description and what to do in the event that they are not satisfied should be clear. Most
transactions, if paid for by credit card, are protected by bank legislation so they should always
use a credit card. Customers should always print out details of the transaction in case of future
disputes:
Data protection legislation
Data protection acts exist in most countries. These set down rules for keeping data private as well
as confidential. Most countries have similar sets of data protection rules. As an example, here is a
summary of what the UK Data Protection Act states:
Personal data shall be processed fairly and lawfully.
Personal data shall be obtained only for a lawful purpose (or purposes), and shall not be used
for anything other than that purpose (or purposes).
Personal data shall be adequate, relevant and not excessive in relation to the purpose (or
purposes) for which they are processed.
Personal data shall be accurate and, where necessary, kept up to date.
Personal data processed for any purpose (or purposes) shall not be kept for longer than is
necessary for that purpose (or purposes).
Personal data shall be processed in accordance with the rights of data subjects.
Appropriate measures shall be taken against unauthorized or unlawful processing of personal
data and against accidental loss or destruction of, or damage to, personal data.
Personal data shall not be transferred to a country outside the European Economic Area unless
that country guarantees the same level of data protection.
The Act also allows you to find out, on payment of a nominal fee, what information is being held
about you by an organization.
Punishment for breaking any of the above principles is a very large fine.
Organisations are accountable for their decisions to pass on information. When they pass on
information about an individual they have to make sure that only the least amount of information
that could identify the individual should be used. Online services, particularly online banking
and shopping, allow organizations to have access to the most private of data such as names,
addresses, phone numbers, financial situation etc. It is essential that such information is not
passed on from organisation to organisation without authorization from the individual.
Anonymised information
Information about individuals without mentioning the person by name is called anonymised
information. Where anonymised information would be sufficient for a particular purpose,
organizations should always omit personal details wherever possible.
Aggregated information
Aggregated information is where personal details of individuals are combined to provide
information without naming those individuals. However, this may not always safeguard details
adequately. An example could be a hospital which statistically analyses all of its patients
(without using their names) who suffer from a particular illness or disease and produces
information about those patients, for example the number of patients who suffer from a specific
disease whose income is below a certain level. As this covers all the patients, no one patient is
identifiable. The problem is that there may be only one patient suffering from a particular disease
and so it is obvious who the hospital is referring to.
Breaches of confidence
As was mentioned above, organizations should include a duty of confidence clause in
employment contracts. Individuals who feel that their confidential data has been made public
(i.e. their confidentiality has been breached) should complain to the organisation.
Identity theft
Credit card fraud and identity theft occur more often with conventional banking than with online
banking. Many people today are concerned about identity theft, which usually occurs in the form
of stolen credit card data.
When a purchase is made in some restaurants, shops or petrol stations some customers let the
waiter or cashier take the credit card out of their sight. The waiter might use the excuse that the
card reader is in the back of the building. The card is then skimmed on a special reader and all
the details are copied from the card. Sometimes, to try and avoid suspicion, the skimming
machine can be just below the cash till and the customer hardly notices that it has been skimmed
as well as swiped for the transaction. With all these details, numerous Internet transactions can
be carried out.
A rarer method, but it still happens, is when retail outlets databases are hacked into and all
customer data is copied for illegal use.
Call-line centres for banks have had employees copy data to pass on to criminals, who then use
the data to make illegal transactions.
Online transactions tend to be more secure. However, even though the data is encrypted, at some
point it has to be decrypted in order to process it. At this point, it becomes vulnerable to theft.
Phishing
Phishing is when details of credit cards, debit cards or bank accounts are given out by customers
to people they think are representatives of banking organizations. It can be as simple as an e-mail
that might ask for a customers details and appear to be from the bank they normally use. The e-
mail may say that the bank needs the information so that its systems can be updated or that it is
checking that it has the correct e-mail address. It asks the customer for their password, card or
account number and other security details. Most banks overcome this by making it clear that they
would never ask for the full password, just a number of characters from it (usually three).
Phishes often include a website address for the customer to go to which, looks just like the actual
banks website. It is actually a fake website they have set up purely to get customer details.
Pharming is a variation of phishing. The fraudster can redirect a genuine websites traffic to
their own website. The customer thinks they are dealing with their bank (the site is the normal
site they would log on to) but are actually sending their details to the fraudster website.
Spyware
Spyware is software which customers unwillingly download. This usually happens when
computer users download certain software. They do not realize that the fraudster or hacker has
attached spy-ware to it to gather personal details of the user, often by means of detecting key
presses on the keyboard when the user logs on to their bank account or goes online shopping.
The two most common RST ailments experienced by computer users are:
Carpal tunnel syndrome, the name given to a condition causing pain in the forearm and wrist.
The number of cases has increased since the 1980s, due to the increased use of computers in
offices. It affects women more than men.
Cubital tunnel syndrome, a similar condition which affects the elbow. It is sometimes referred
to as cell phone elbow, caused by keeping the elbow bent in order to make and take calls on a
mobile phone.
RSI is often caused by computer users having their arms and wrists at awkward angles when
working at the computer. This picture illustrates the ideal arm and hand positions for computer
work.
RSI is often caused by computer users having their arms and wrists at awkward angles when
working at the computer.
This picture illustrates the ideal arm and hand positions for computer work.
Upper back and neck problems are often caused by bad positioning of a computer screen or bad
lighting. Typical symptoms include neck pain, shoulder pain, weakness of the arm and hand muscles
and headaches. Lower back pain can be caused by prolonged sitting or standing. Visual problems
such as eye irritation and eye strain are also quite common among long-term computer users. This
can be caused by glare from the screen, poor positioning of the screen and poor lighting. Most call
centres are designed to reduce these and times should be set aside for the operators to be able to get
up and walk around.
Many safety problems are caused by the use of a large number of computers close to each other, as is
particularly the case at online centres. This leads to a need for increased safety measures, against
electrocution, fire and other dangers.
Electrocution
This is a rare occurrence but can occur wherever there are lots of computers, electrical cables and
sockets.
Safety measures include the following:
Electrical sockets should not be overloaded. The use of automatic fuse trips means that when there
is an overload the circuit trips out.
All electrical installations must be carried out by a qualified electrician.
All equipment must be of a reliable standard and should be checked annually by qualified
electricians.
All electrical equipment must be located away from water supplies and workers must have a sound
knowledge of electrical safety.
Workers must not take drinks to tables where they are working with electrical equipment
Fire
When computers overheat or wires fray, this can lead to fire.