Help Desk Technician
Help Desk Technician
Help desk technicians support end users in their daily use of IT, especially applications. They may
be part of an organizational help desk group or employees of an organization that provides help desk to other organizations. In both cases, but especially in the latter, they often provide help via the telephone. They may also communicate directly with a user’s PC via a network and special software that gives them control of the user’s PC. Help desk technicians are often required to have knowledge of a wide variety of PC applications.
PART 1 THE INFORMATION AGE
New technology almost always improves lives. But it shopping habits; the drugs you take (and through often also has undesirable effects. This was true of the
this information, the diseases you might have); the labor-saving machines that prompted the industrial
political party to which you contributed; and so on. revolution (introducing 16-hour workdays and child
Civil rights advocates argue that IT has created a labor under harsh conditions), and it is also true about
Big Brother society where anyone can be observed. information technology. Think of the bliss of IT: it
U.S. business leaders oppose European-style legisla- makes our work more productive because a few key-
tion to curb collection and dissemination of private strokes on a computer keyboard prompt the computer
data because this limits target marketing and other to calculate and print what would otherwise take many
economic activities. Are you willing to give up some human hours. It educates us via technologies such as
of your privacy to help companies better market to multimedia classes delivered online. It opens new eco-
you products and services you might be interested nomic opportunities such as trading with overseas
in? Do you accept the manipulation and selling of consumers via the Internet. It makes the world smaller
your personal data?
by letting people work and socialize together over • Employee Privacy. IT helps employers monitor great distances via networks such as the Web. It
their employees, not only via the ubiquitous video democratizes the business community by making
camera, but also through the personal computers important business tools affordable to both estab-
they use. Employers feel it is their right to monitor lished and start-up companies. And it puts at our fin-
keystrokes, e-mail traffic, the Web sites employees gertips information on practically every imaginable
visit, and the whereabouts of people whose wages subject. So, what’s the dark side? There are quite a
they pay while on the job. So, while IT increases few dark sides, which we will discuss in the following
productivity, it might violate privacy and create chapters. Here is a sample of the main issues and the
stress. Which is more important: your employer’s questions they raise. right to electronically monitor you, or your privacy
and mental well-being? • Consumer Privacy.
The ability to inexpensively
and quickly collect, maintain, manipulate, and • Freedom of Speech. On the Web anyone can transfer data enables every individual and organi-
become a publisher without censorship. Blogging zation to collect millions of personal records. When
and other technologies encourage netizens (Inter- visiting a commercial Web site, chances are the
net users) to opine about anything, from products site installs a little file, a “cookie,” on your com-
to their employers’ misdeeds. Much of the material puter’s hard disk. This file helps track every click
published is of violent and pornographic nature. If you make on that site, so companies specializing
someone posts slurs about your ethnic group at a in consumer profiling can learn your shopping and
Web site, do you want the government to step in buying habits. When you purchase drugs, the
and ban such postings? To what extent should druggist collects details about you. Every time you
Web server operators be responsible for what oth- pay with a credit card, the purchase is recorded to
ers publish through their sites? Is unsolicited com- a personally identifiable record. All these data are
mercial e-mail (spam) a form of free speech? channeled into large databases for commercial
• Online Annoyances. Over 80 percent of all exploitation. Your control of such data is minimal.
e-m ail is spam. Do you accept this? And if you
While consumers, patients, and employees might own a new small business and want to advertise consent to the collection of information on one
via e-mail (because it is the least expensive adver- aspect of their lives by one party and on another
tising method), wouldn’t you want the freedom to aspect by another party, the combination of such
do so? While surfing the Web you encounter information might reveal more than they would
pop-up windows and pop-under windows. Your like. For example, a firm can easily and inexpen-
computer contracts spyware. Sometimes special sively purchase your data from a druggist and sev-
software hijacks your browser and automatically eral consumer goods companies, combine the data
takes you to a commercial site that you do not into larger records, and practically prepare a dos-
care for. Are these annoyances legitimate, or sier about you: your name, age, and gender; your should they be stopped by legislation?
Chapter 1 Business Information Systems: An Overview □ 25 Chapter 1 Business Information Systems: An Overview □ 25
considered professionals, why don’t they comply with sites that purport to be legitimate sites of banks
a mandatory code of ethics as other professionals, and other businesses where they are requested to
such as physicians and lawyers, do? “update” or “correct” their social security num- bers, credit card account numbers, passwords, and
We will discuss these and other ethical and social other information. This information is used by the
issues throughout this book. As you will see, these phishers to make fraudulent purchases and obtain
issues are not easy to resolve. The purpose of these loans. Victims do not only lose money. In many
discussions is to make you aware of issues and pro- cases when phishers steal an identity, the victims
voke your thoughts. Remember that the purpose of experience a long nightmare with authorities and
education is not only to develop skilled professionals businesses. but also to remind professionals of the impact of their
• IT Professionalism. IT specialists play an work on the welfare of other people, and to encourage increasing role in the lives of individuals and the professionals to be socially responsible.