Central to society is the gathering, manipulation, classification, storage, and retrieval of information
Information Technology (IT) allows us to send signals around the world
Ex: tv, internet, satellite, GPS, cellphone
Two Impacts of IT on society:
E-Commerce - Buying and selling of goods and services or transmitting of funds over an electronic network through the internet
Customers will make use of their devices to access online stores where they can browse products and services then place orders.
The internet allows individuals and businesses to buy and sell physical and/or digital goods and services through electronic ways.
Information technology evolves rapidly, however, with these evolutions comes the evolution of scammers as well.
Issues associated: data privacy, intellectual property, free speech, taxation, computer crimes, consumer protection, miscellaneous,
internet auction fraud - fraud perpetrated on auction sites. Examples are misrepresentation of products for sale, fraudulent bidding, or nondelivery of goods purchased during auctions. Bid shilling/shielding is when the scammer drives up the bidding price of the item.
Disaster relief scam - Hiding behind the guise of an actual aid organization, scammers typically use a tragedy or natural disaster to con you out of your money. By thinking you're donating to an emergency relief fund, you unwittingly provide credit card or other e-payment information.
Phishing scam - victims receive emails from enterprises that they frequent, such as banks or universities. The message directs them to sites that will require updating of personal information that scammers will steal.
Grandparents scam - fraudsters will pose as a panicked grandchild who needs cash immediately for “emergencies”.
Web cramming - billing customers for a website they didn’t know they had.
Mobile/Credit card cramming - companies will place unauthorized charges for telephone and non-telephone related services to your telephone bill. These charges will appear on your bill using terminologies you may not be familiar with.
Pyramid scams - marketing and investment frauds in which an individual is offered a distributorship or franchise to market a particular product. The real profit is earned, not by the sale of the product, but by the sale of new distributorships. Also known as franchise fraud or chain referral scams
Business opportunity/work at home scams - scammers pose as reputable companies to create fake job postings to benefit themselves. These are used as a means to steal personal information or financial assets.
Multilevel marketing or mlm - A sales strategy in which the salesforce is financially incentivized to recruit and sell inventory to additional salespeople, and which can sometimes be construed as an illegal pyramid scheme.
Investment and get rich quick scams - people will attempt to trick you into investing money: stocks, bonds, notes, commodities, currency, real estate.
Travel/Vacation fraud - scammers will request upfront payments for “travel arrangements” such as flights, accommodations, etc.
Telephone/pay per call solicitation frauds - these scams entice victims to pay to make calls in order to receive information such as how to save money on groceries, etc. They will charge you exorbitant prices as a “consultation fee” for calling the numbers.
Health care frauds - committed by either medical care providers or patients.
Double Billing - submitting multiple claims for the same service
Phantom Billing - billing for a service visit or supplies the patient never received
Upcoding - billing for a more expensive service than the patient actually received
other examples are unbundling, prescription frauds, forgery, diversion which is diverting legal prescription/selling your prescription medication, doctor shopping
expands job-related knowledge
Increases productivity
Improves communication
Types of monitoring:
Email and internet usage, printer/fax usage, workers via video cameras, cellphone usage, GPS equipped vehicles
engaging in dangerous activities (e.g., usage of cellphone while driving a company vehicle)
copying company software for home use
Accessing corporate files without permission
Blaming errors on technology
Computer shopping
Invading a co-worker's privacy
Visiting porn sites and playing games
Seeking employment on company time
Impact of Computers on work:
Jobs have been eliminated, while new others were created
Repetitious or boring jobs are now done with computers
There is more time for creativity
Some workers ”telecommute” (work from home or remote locations)
Employers can better monitor their employees
Health issues have been associated with computer usage
Impact on employment:
Job destruction and creation
Computers and unemployment:
Automation leads to loss of jobs
Computerization eliminates some jobs
Computer efficiency means fewer jobs
technology is often blamed for massive unemployment
Likewise many fear technology will eliminate jobs
Complicated economic and political factors contribute to job destruction
Some jobs move from wealthy countries to less wealthy ones (pay rates are lower in lesser ones)
The internet and web reduce the need for transportation and make it easier for information technology
Need for computer designers, builders and programmers creates jobs
Need for training, sales and technical support creates jobs
Computers make many products affordable to more people. Thus, more jobs are created in order to make those products.
Changing Skills and jobs
Optimistic outlook:
education system adapts rapidly to create newly trained workers
Technology can be used to retrain displaced workers
Pessimistic outlook:
advanced software will eliminate many jobs requiring high skills
Automation and the web will lead to mass unemployment
Possible health problems: RSI or Repetitive Strain Injury from frequent use, radiation exposure, toxic waste from discarded computer parts
Teleworking - a form of work that allows employees to work part or full time at home or at satellite offices.
Benefits:
Flexible schedule and work options
Reduced overhead
Reduction in transportation and parking resources
Problems:
Less productive or overworked employees
Lack of belonging (social isolation)
Potential distractions are counter-productive
Employee monitoring:
Data entry, phone work and retail
Types of monitoring:
Keystroke - to determine if quotas are met or employee is on task
Phone - to determine customer satisfaction and proper use of phone resources
Types of location monitoring:
Badges - to replace worker keys or track down workers
GPS tracking systems - to locate vehicles, employee driving speed
Health issues from the manufacture and use of computers:
radiation exposure from terminals
Toxic wastes from discarded computer parts
Repetitive Strain Injury (RSI)
IT in Banking
Telephone and internet banking, ATM, Debit Card, Credit Card, Magnetic Ink Character Recognition, e.g., cheque processing
IT in Crime Prevention:
scanning crowd for criminals
Casinos use face recognition systems to identify “undesirables”. This is also used in banks, gas stations
Surveillance and monitoring
Crime mapping technology
How are computers used in manufacturing?
CAD - Computer Aided Design is a method of using computers to design things such as buildings or items. It allows designers and engineers to create 2D drawings and 3D models of their designs then modify and test them. It also includes tools for analyzing designs. CAD has become a key part of the design process in many industries, and it has replaced manual design and drafting processes. It has led to more detailed, accurate, and efficient representations of products, which improved the quality of manufacturing goods and streamlined planning.
CAM - Computer Aided Manufacturing is the use of software and computer controlled machinery to automate manufacturing processes.
The “bio” part of the word is derived from biology, life
Biotechnology refers to any technique that uses living organisms or substances from those organisms to make or modify a product, to improve plants or animals to benefit humans
Webster's Definition: the aspect of technology concerned with the application of living organisms to meet the needs and ends of man
Multidisciplinary in nature, involving input from engineering, computer science, cell and molecular biology, genetics, physiology, biochemistry,biochemistry immunology, virology, recombinant DNA technology
Ancient Biotechnology |
early history as related to food and shelter, including domestication Paleolithic people began to settle and develop agrarian societies about 10,000 years ago Early farmers in the Near East cultivated wheat, barley, and rye. In Egypt 6,000 years ago, early farmers arrived with cattle, sheep, goats, and crops such as barley, emmer, and chickpea. They saved seeds and tubers, thus saving genetic stocks for future seasons. People collected seeds of wild plants for cultivation and domesticated some species of wild animals living around them, performing selective breeding. |
Classical Biotechnology |
exploits early discoveries of the fermentation process for production of various products: different types of beer, vinegar, glycerol, acetone, butanol, lactic acid, citric acid, and antibiotics such as penicillin which was created by Alexander Fleming. (From penicillium) Alcoholic fermentation equation = Sugar (glucose, fructose) + Yeast (saccharomyces cerevisae) - Oxygen (O2) = Carbon Dioxide + Ethyl Alcohol TWO TYPES OF FERMENTATION: Animal cell - in the absence of oxygen, pyruvic acid is converted to lactic acid Plant fermentation |
Modern Biotechnology |
manipulates genetic information in organisms, often called genetic engineering. Genetic engineering is the direct modification of an organism's genome, which is the list of specific traits/genes stored in the DNA. Genetically Modified Organisms (GMOs) It changes the genetic information in the cell. A gene of one organism may be isolated, cut, and moved into the cell of another organism. Recombinant DNA (rDNA) technology, also known as genetic engineering, refers to the manipulation and modification of DNA from different species to create new genes with desired functions. |
DNA has a double helix structure. Nucleotides are the building blocks for both RNA and DNA. Nucleotides are composed of phosphate and deoxyribose (five carbon) sugar where 4 nitrogenous bases are attached (A, T, C, G).
It contains four nitrogenous bases which are: Adenine, Guanine (purines), Thymine, Cytosine (pyrimidines).
Found in pairs: AT, GC
A segment of DNA is called a gene. A gene corresponds to a certain trait. A genome is a complete set of DNA found in an organism.
A plasmid is a circular loop of DNA. In cutting plasmid, enzymes are used.
Recombinant DNA is made using transformation, transduction, and conjugation
Restriction enzymes are molecular scissors that cut double stranded DNA molecules at specific points. They are found naturally in a wide variety of prokaryotes and are an important tool for manipulating DNA. DNA ligase is a molecular glue.
Microbes are used for genetic engineering:
because bacteria is unicellular and has plasmids that mark genes.
They reproduce asexually and have rapid multiplication ability.
Insulin producing bacteria: recombinant DNA is a technology scientists developed that made it possible to insert a human gene into the genetic material of a common bacterium. The bacteria used in genetic engineering is E. Coli.
Paul Berg - first to use restriction enzymes and DNA ligase to alter DNA in 1972.
Stanley Cohen and Herbert Boyer - perfected techniques to cut and paste DNA
How insulin from recombinant DNA is made:
First, the human cell with the gene that controls the production of insulin is isolated.
Then the DNA is isolated.
Afterwards, the gene of interest is isolated. cut using restriction enzymes.
Using a restriction enzyme, plasmid is cut.
Then, plasmid is reinserted into the E. Coli using DNA ligase.
Afterwards, the recombinant E. Coli will have the ability to produce insulin.
Genetically engineered bacteria can be used to eat oil and help clean up oil spills.
Alcanivorax borkumensis is a small bacterium that thrives on petroleum. Able to feed on both hydrocarbon and allies abundant in oil, this bacterium occurs naturally near oil seeps in marine environments. Vitor Martins dos Santos sequenced the genome of A. Borkumensis in search of gene sequences that can be inserted into synthetic organisms to degrade oil spills.
Agrobacterium tumefaciens is a bacterium used in genetic engineering to transfer DNA into plant cells. It is a preferred tool for genetic engineering because it can transfer a segment of its genome.
The Ti plasmid can be used to transfer any desired gene into a plasmid
Scientists have engineered golden rice, which received genes from a daffodil and a bacterium that enable it to produce beta-carotene.
Bt Corn - bacillus thurigienesis; produces crystals of endotoxin which acts as a natural toxin to insects mainly in their larval stage, thus acting as insecticides.
Polymerase Chain Reaction is like a molecular xeroxing process. It produces millions of copies of a gene. The process involves three basic steps.
Using gel electrophoresis to visualize the results of PCR. Fragments of DNA are pulled through a gel matrix by an electric current, and it separates DNA fragments according to size.
Cloning is a process that creates an exact genetic replica of a cell, tissue, or entire organism.
Types of Cloning: | |
Gene Cloning | creates copies of genes or DNA segments |
Reproductive Cloning | creates copies of entire animals |
Therapeutic Cloning | creates embryonic stem cells that can be used to grow healthy tissue to replace damaged tissue in the human body. |