Learning Outcomes:
Students should be able to :
• demonstrate knowledge and understanding of how digital technology has affected business in the following areas:
− retraining;
− job displacement;
− job creation;
and − teleworking;
• demonstrate knowledge and understanding of how a business can use the following digital technologies and their implications:
− Radio Frequency Identification (RFID);
− Global Positioning System (GPS) tracking; and − contactless payment;
• evaluate the impact that digital technology has had on business and customers, particularly in relation to:
− security and/or e-safety;
− costs;
− training; and
− legislation (students should be aware of the contents of the following:
the Data Protection Act 1998,
the Copyright, Designs and Patents Act 1988 (Amendment)
Regulations 2010
and the Computer Misuse Act 1990);
Class Learning Activity
Name a technology that has affected businesses in some way.
Discuss the benefits of it to the business?
Discuss the drawbacks of it to the business?
•Retraining
Most jobs nowadays involve the use of computers, many people have had to retrain to use computers to perform their job. This can be stressful for some people who aren't experienced users of digital technology but usually the benefits outweigh any negatives.
•Job Displacement
Digital technology has displaced many old jobs. One example is photo developers, digital photos means this is no longer required. Many people have lost jobs in the manufacturing industry due to robots. Shop workers may soon also be replaced by self service tils. But many new jobs are also being created.
•Job Creation
Digital technology has created a wide range of new jobs which didn't exist 30 years ago. Network managers, software developers, testers, help-desk operatives are all example of new jobs created by ICT developments
•Teleworking
This involves people working from home through the use of Digital Technology. Laptops and the internet allows us to communicate in real time and access our work files from anywhere. One of the main benefits of Lockdown was the upskilling in teleworking and use of Digital Technology.
Radio Frequency Identification (RFID)
This uses electromagnetic fields to identify and track tags attached to objects or people
Each tag is a unique identifier of the object, RFID device is scanned to retrieve the information.
Business uses
–Stock tracking
–Restricted access zones
–Anti-theft
Global Positioning System (GPS)
–Is a satellite navigation system that determines a users position anywhere in the world. This is the main technology behind Sat Nav.
Business uses
–Distribution - track deliveries over land, sea or air
–Marketing – linked to geographical location
–Human resources – tracking location, breaks of staff eg sales or delivery staff
Contactless payment is a fast way to pay for purchases costing (currently £30 and under, 2017). Contactless payments are becoming increasingly common on a range of devices including:
–Pre-paid, debit, charge and credit cards
–Wearable devices, such as watches and wristbands
–Mobile devices, such as smartphones and tablets
Business uses
–Faster transactions/shorter queues
–Cost reduction – staffing
Class Learning Activity:
What are the potential security threats to a businesses IT systems?
How might this threat affect the business?
How might this threat affect the customers?
How can businesses protect themselves from each threat?
How can customers protect themselves from each threat?
•Encryption- This is when data is scrambled before being sent across a netwrok, the recipeint needs a key to decrypt the data back into its original form. If someone accessed the data without the key it will be meaningless for them. Most modern websites uses encryption when collecting customer transaction data to keep it safe.
•Secure site – https/ padlock
When on a reputable website we usually see a padlock in the browser to the left of the URL this lets us know the website is encrypted.
•Username and password
These are used to control access to certain services/files. It is important that a strong password is used. It should be changed regularly and never shared with others.
•Biometric Authorisation
This is when we scan a person's body part such as fingerprint or retina in ordert to allow access to certain devices or areas. It can be used to improve security and reduces the need for passwords.
Hardware/software
Set up
Maintenance
Updating
Staffing
Recruitment of new staff
Retraining of existing staff
Security
Recruitment of IT Staff
Back Up
Anti Virus Software
Changing and upgrading technology leads to increased staff training and retraining
Whilst there are benefits of having a well trained staff. This training also comes at a financial cost to the business
Stress levels of staff can also be increased as they have to deal with continuous change and retraining
Training methodology may also be introduced as a result of technology e.g. video tutorials
Data Protection Act
•Customer data must be stored in accordance with the Data Protection Act
•Principles:
–Data must be kept accurate and up-to-date.
–Data must be kept no longer than necessary.
–Data must be processed fairly and lawfully.
–Data must be held securely.
–Data must not be transferred outside the EU.
–Data must not be kept longer than necessary.
–Data must only be used for the specified purpose.
–Data must be adequate and relevant for the intended purpose.
Copyright, Designs and Patents Act
•Covers:
–illegally copying or downloading software
–stealing ideas from one company for use in another
–using unlicensed software
–non-payment of downloaded materials
Computer Misuse Act
•Covers:
–gaining unauthorised access to a computer system
–deliberately planting viruses in a computer system
–committing computer fraud
–using a company computer without permission
Class Learning Activity
Create a list of 10 questions and answers from this topic. Use them in the Quiz-Quiz-Trade activity.