16
CHAPTER 1 INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY

Chapter 1-introduction to ict

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Chapter 1-introduction to ict

CHAPTER 1

INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY

Page 2: Chapter 1-introduction to ict

1.1 INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY

1.1.1.1 Define ICT.

ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.

Page 3: Chapter 1-introduction to ict

INFORMATIONInformation refers to the knowledge obtained from reading,

investigation, study or research. The tools to transmit information are the telephone, television and radio. Information is knowledge and helps us to fulfill our daily tasks.

COMMUNICATIONCommunication is an act of transmitting messages. It is a

process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Communication is important in order to gain knowledge.

TECHNOLOGYTechnology is the use of scientific knowledge, experience

and resources to create processes products that fulfill human needs. Technology is vital in communication

Page 4: Chapter 1-introduction to ict

1.1.1.2 Evolution of computers. COMPUTER GENERATIONS

First Generation (1940-1956)

SECOND GENERATION (1956-1963)

THIRD GENERATION (1964-1971)

FOURTH GENERATION (1971- PRESENT) FIFTH GENERATION (PRESENT & BEYOND)

NEW ERA COMPUTER

Page 5: Chapter 1-introduction to ict

1.1.2.1 The usage of ICT in everyday life

◊ EDUCATION In education, teachers, students, researchers and school administrators benefits from the usage of ICT.

◊ BANKINGIn the banking, customers, businessman & bank administrator benefits from the usage of ICT.

◊ INDUSTRY

Computers are used to facilitate production planning and control systems, to support chain management and to help in product design in the industrial sector. In the industrial sector, workers, researchers and administrator benefits from the usage of ICT.

◊ E-COMMERCE

E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient and faster. For this application, computers, Internet and shared software are needed. In the e-commerce sector, customers, suppliers and employees benefits from the usage of ICT.

Page 6: Chapter 1-introduction to ict

1.1.2.2 Differences between computerised and non-computerised systems.

Computerised Non-Computerisedmore interesting & interactive experiences

depends on teachers & textbook

all transactions are done by computers

banking was done manually

Computers and telecommunications industry became very popular and profitable since production can be increased through an all day operation.

Production was slow because everything was done depended on human labour.

E-commerce plays an important role in the economic scene. It includes distribution, buying, selling and servicing products that are done electronically

Trading was made using the barter system and it was then later developed into currency.

Page 7: Chapter 1-introduction to ict

1.1.2.3  IMPACT OF ICT ON SOCIETY.

impact of ICT on society

FASTER COMMUNICATION

SPEED LOWER

COMMUNICATION COST

RELIABLE MODE OF

COMMUNICATION

EFFECTIVE SHARING OF

INFORMATIONPAPERLESS

ENVIRONMENT

BORDERLESS COMMUNICATION

SOCIAL PROBLEMS

Page 8: Chapter 1-introduction to ict

1.2 COMPUTER ETHICS AND LEGAL ISSUES1. 2.1.1 DEFINE COMPUTER ETHICS, CODE OF ETHICS, INTELLECTUAL PROPERTY, PRIVACY, COMPUTER CRIME AND CYBER LAW.

COMPUTER ETHICSComputer ethics is a system of moral standards or

values used as a guideline for computer users. It is needed to stop the current technology products from being exploited.

Ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. Code of ethics in computing means moral guidelines to refer to when using the computer and the Internet.

Page 9: Chapter 1-introduction to ict

INTELLECTUAL PROPERTYIntellectual property refers to any product of human intellect that is

unique and has value in the market place. This covers ideas, inventions, unique name, computer program codes and many more.

PRIVACYPrivacy in IT refers to data and information privacy. In general, data

include texts, numbers, sounds, images and video. Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them.

CYBER LAWCyber law refers to any laws relating to protecting the Internet and other

online communication technologies.

Page 10: Chapter 1-introduction to ict

1.2.1.2 DIFFERENTIATE BETWEEN ETHICS AND LAW. ETHICS LAW

Guideline: As a guideline to computer users. Moral Standards: Ethical behaviour is judged by moral standards. No Punishments: No punishment for anyone who violates ethics. Free To Follow: Computer users are free to follow or ignore the code of ethics. Immoral: Not honouring computer ethics means ignoring the moral elements (immoral). Universals: Universal, can be applied anywhere, all over the world Produce Ethical Computer Users: To produce ethical computer users

Control: As a rule to control computer users. Judicial Standards: Law is judged by judicial standards. Must Follow: Computer users must follow the regulations and law. Punishments: Penalties, imprisonments and other punishments for those who break the law. Depends On Country: Depends on country and state where the crime is committed. Prevent Misusing Of Computers: To prevent misuse of computers. Crime: Not honouring the law means committing a crime.

Page 11: Chapter 1-introduction to ict

1.2.1.3 INTELLECTUAL PROPERTY LAWS.

Intellectual property laws are needed to establish and safeguard the

intellectual property which refers to works created by inventors, authors

and artists. It is also needed as businesses today continue to expand

globally. There are four types of Intellectual Property protection. They are patents for invention, trademarks for brand identity, designs for product appearance and copyright for material.

Page 12: Chapter 1-introduction to ict

1.2.2.1 THE WAYS TO PROTECT PRIVACY.

•he privacy laws in Malaysia emphasises on the following:

•Security Services to review the security policy Security Management to protect the resources Security Mechanism to implement the required security services Security Objects, the important entities within the system environment

Privacy law

•Example: anti-spam program, firewall, anti-spyware and antivirus.

Utilities

software

Page 13: Chapter 1-introduction to ict

1.2.2.2 DEFINE AUTHENTICATION & VERIFICATION

METHODS/ TECHNOLOGIES.Methods of Authentication

Methods of Verification

There are two commonly used authentication methods, which are biometric device and callback system. Biometric device is a device that

translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint

Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition and Signature Verification. Callback system

refers to the checking system that authenticates the user.

There are two methods used in verification, which are user identification and processed object. User identification refers to the process of validating the user. Processed object refers to something the user has such as identification card, security token and cell phone.

Page 14: Chapter 1-introduction to ict

1.2.3.1 EFFECTS OF CONTROVERSIAL CONTENTS ON SOCIETY

PornographyPornography: can lead to criminal acts such as exploitation of women and children can lead to sexual addiction or perversion can develop low moral value towards other men, women or children can erode good religious, cultural and social beliefs and behaviour

Slander Slander: can develop into a society that disregards

honesty and truth can develop bad habit of spreading untruths and rumours can lead to unnecessary argument can cause people to have negative attitudes towards another person

Page 15: Chapter 1-introduction to ict

1.2.4.1 CYBER LAW.

Cyber Law is needed as in the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet.

1.2.4.2 Computer crimes below

FraudTheft

Copyright Infringeme

nt

Attacks

Page 16: Chapter 1-introduction to ict

1.1.3 COMPUTER SECURITY1.3.1.1 DEFINE COMPUTER SECURITY.

1.3.2 .1 Security Threats

Computer security means protecting our computer systems and the information they contain against unwanted access,

damage, destruction or modification. Three types of computer security are: hardware security software

security/data security network security

Malicious code

Hacking

Natural disaster