You are on page 1of 35

Computer Aided

Process Planning,
Security and Ethical
Challenges,
Improving business
Quality
CAPP(Computer Aided Process Planning)
Process Plan
As new age manufacturing processes are evolving,
Computer Aided Process Planning (CAPP) helps in
simplifying and efficiently carrying out the
conventional process planning and optimizing use of
resources.
Detailed set of instructions, engineering drawings,
specifications, parts and materials lists etc.
Process Planning
Basic Process in developing a
process plan
Process Planning
Approaches

Manual Systems
Computer Aids
Variant System
Experimental Generative System
Manually Prepared Process
Plans
Computer Aids
Variant (Retrieval) CAPP
Methodology
Security challenges
Computer crimes that exist in the
present society are:-
Hacking
Cyber Theft
Unauthorized use at work
Software Piracy
Piracy of intellectual property
Computer viruses and worms
Hacking
Hacking is the obsessive use of computers,
or the unauthorized access and use of
networked computer systems. Hackers
usually
Steal or damage data
Get unauthorized access to computer files
Monitor e-mails or web server access
May use remote services that allow one
computer to execute programs on another
Plant data that will cause system to
welcome intruders
Cyber Theft

Cyber theft involves theft of money by


unauthorized network entry and
fraudulent alteration of computer
databases.
Unauthorized use at Work
Unauthorized use of computer
resources especially by employees
Playing video games
Unauthorized use of internet
Non-work related upload/download
Transmission or confidential data
Moonlighting
Software Piracy

Unauthorized copying of data is called


software piracy or software theft
Software is protected by copyright law
and user license agreement that
allows only limited copies to be made
Piracy of Intellectual
Property

Materials other than software are also


pirated by making multiple copies
Piracy of music, video, images,
articles, books etc.
Dissemination of these material
through internet websites
Computer viruses and
worms
A virus is a program code that cannot work
without being inserted into another program
A worm is a distinct program that can run
unaided
These programs copy annoying or destructive
routines into the networked computer systems of
anyone who accesses computers affected with
the virus or who uses copies of magnetic disks
taken from infected computers
They enter a computer through e-mail or file
attachments, or through illegal software. A virus
usually copies itself into the OS, and then spreads
to main memory and thus hard disk and any
inserted external memory.
Privacy Issues

Privacy on the internet


Computer Matching
Privacy Laws
Computer libel and censorship
(threats are spamming and flaming)
Other Challenges
Employment challenges because a lot of
tasks have been automated
Computer monitoring causes intrusion in
personal space for workers
Challenges in working conditions are caused
by tasks which are monotonous in nature.
But it also automates most of the work and
gives way to more challenging jobs
Challenges to individuality as they eliminate
the human relationships between people
Health issues

Cumulative trauma disorders


Carpal tunnel syndrome
Radiation caused by cathode ray
tubes (CRTs) is also a health concern
Benefits

Medical diagnosis
Crime control
Environmental monitoring
Urban planning
Computer based training
Distance learning
Security management of IT
Encryption Security codes
Firewalls Backup files
Denial of service Security monitors
attacks Biometric security
Computer failure
E-mail monitoring
controls
Virus defense Fault tolerant systems
Disaster recovery
System controls and
audits
Encryption
The concept of private key and public
key can be extended to
authentication protocols. There are
three types of authentication
protocols followed by organizations.
1. Password Authentication protocol
2. Challenge Handshake authentication
Protocol
3. Extensible Authentication Protocol
Firewall
Firewalls are used to restrict access to
one network from another network.
Different types of firewalls exist.
1. Packet Filtering
2. Stateful firewalls
3. Proxy Firewalls
4. Kernel Proxy firewalls
Ethical responsibility of Business
Professionals

concerned with Rights, Honesty

Exercise of corporate power


Theories of corporate social
responsibility
The stockholders theory holds that managers
are agents of the stockholders and their only
ethical responsibility is to increase the profits of
the business without violating the law or
engaging in fraudulent activities.
The social contract theory states that
companies have ethical responsibilities to all
members of society, which allow corporations to
exist based on a social contract
The stakeholders theory states that managers
have ethical responsibility to manage a firm for
the benefit of all of its stakeholders i.e.
stockholders, employees, customers, suppliers
and local community.
Principles of technology
ethics
Proportionality of benefits to risk
Informed consent to risks
Justice in distribution of risk with
benefits derived to each subunit
Minimized risk by the selected option
Ethical guideline
Acting with integrity
Increasing your professional
competence
Setting high standards of personal
performance
Accepting responsibility for your work
Advancing the health, privacy, and
general welfare of the public
Improving business Quality
Every business ownerlikes to think
that he or she has a commitment to
quality.
If that were truly the case, of course,
no product would ever disappoint,
and no service would result in a
complaint.
5 steps for Improving business
Quality
1. Make a commitment.
2. Track mistakes.
3. Invest in training.
4. Organize quality circles.
5. Have the right attitude.

You might also like