Public places such as hotels, cafes and train stations providing WiFi access for visitors
Tethering/Personal Hotspot example
Connecting a device without a network connection to one with a network connection, via Bluetooth, USB cable or WiFi
Ad hoc networks
Scalable - more devices can be added at any time
Flexible - can be temporarily set up at any time in any location
Quick to set up - devices can communicate instantly once a connection is established
Ad hoc networks Drawbacks
Less secure - more open and likely to be accessed by attackers
Slower - limit to amount of data that can travel at one time
No overall control - makes the network disorganised
Ad hoc networks have security issues • anyone can access, no password needed to join, no encryption
Ad hoc networks have performanceissues: poorsignal, limitedrange, incomplete data transfer
Ad hoc networks have availability issues: rural areas have less network coverage, mobile networks not as advanced in developing countries, network coverage can be poor in some parts, hills, valleys and thick walls cause blackspots
Cloud storage
Storing files and foldersremotely
Features of cloud storage
Scalability
Access rights
Synchronise - ensures the content is same on all devices
Available 24/7
Benefits of cloud storage
Can be accessed 24/7, anywhere, if you have an internet connection
Scalable
Security is managed by cloud provider
Drawbacks of cloud storage
Need an internet connection
Can be expensive to buy more storage
Need to trust the cloud provider
Cloud computing
Being able to access and share online applications via the internet
Features of cloud computing
Share files
Use same version
Collaborate
Benefits of online applications
Can be accessed if you have an internet connection
No updates needed
Cost effective
No installation
Collaboration tools - add comments, track changes, live editing, chat features
Factors to consider when choosing a cloud platform
Security
Storage space
Ease of use
Device accessibility
Cost
Interface design
Organisations need to consider how suitable their chosen platforms and cloudservices will be for their users
Implications of cloud technology include security of data, compatibility, responsiveness to user, managing demand, task complexity, devices, compatible systems, compatible software, software updates, minimise downtime, staff expertise
Benefits of collaborative technologies
Global and multicultural workplace
Inclusive workplace
Available 24/7 365 days
Flexibility of working
Managing a modern team remotely
1. Allocating tasks on a to do list
2. Scheduling when tasks should be completed
3. Using a message board to communicate important information
Communication tools
Voice calls
Online messaging
Email
Video call
Social media
Intranet
Stakeholders
Customers, employees, suppliers and anyone else that has an interest in the organisation
Ways of communicating with stakeholders
Social media
Email
Website
Voice calls
Live chat
Inclusivity
Including people who can't work in a traditional way and might be otherwise excluded
Accessibility
Making computers available to everyone
Accessibility features
Text to speech - read aloud the text on the screen for visually impaired users
ALT tags - text that describes an onscreen image for people with visual impairments
Speech to text - speech captured through the microphone and converted to text on the screen
Screen magnifier/Zoom - enlarges onscreen text
Changeable font size
Changeable font colours
Benefits of remote working for organisations
Reduced office space
Improved recruitment pool
Improved morale
Less sick days
Drawbacks of remote working for organisations
Employees may not be as productive
Employees can't build relationships
May have security issues when dealing with personal data
Impact of remote working on individuals
Benefits: 1. Saves travel costs and travel time
2. flexible hours,
3. work at own pace,
4. take breaks when you want
Drawbacks: Higher household bills, lack of routine, lack of social life, distractions, work life balance
Data Protection Principles
Protects people's personal data
Data Protection Principles
Data must be processed lawfully and fairly
Data must be accurate and kept up to date
Data must only be collected for a specified purpose
Data must be protected and stored securely (e.g. encryption)
Data must not be transferred to another place without the same level of protection
Data must not be kept longer than necessary
ICO
Information Commissioner's Office
Data subject
The person the data is about
Rights of the data subject
To know how your data is processed
To have data erased (right to be forgotten)
To be able to withdraw consent
To get and reuse your data for different services
To have inaccurate data corrected
To be informed about how your data is used
To be able to access the data held about you
Computer Misuse Act
It's illegal to access a computer system without permission, create malware that deletes, steals or modifies data, and intentionally spread malware
Offences under the Computer Misuse Act
Unauthorised access
Unauthorised modification
Creation of malware
Intentional spreading of malware
Trademark
A design, symbol or words legally registered by a company or product so they are recognised