Full Transcript

Grade 12 INFORMATION TECHNOLOGY 1 INFORMATION SYSTEM AND THEIR APPLICATION What is information technology? What is information system? Learning Objectives Explain ethical and legal issues in information system Explain environmental, health, an...

Grade 12 INFORMATION TECHNOLOGY 1 INFORMATION SYSTEM AND THEIR APPLICATION What is information technology? What is information system? Learning Objectives Explain ethical and legal issues in information system Explain environmental, health, and social issues in information system Recognize the basics of intellectual property rights Describe digital identity management Appreciate the role of digital technologies in citizenship Unit overview New technologies create new situations that can effect on human behavior Users should be aware of information systems’ use and access and maintaining the rights of creators and innovators The use of new technologies including information systems, has a significant impact on human behavior and our daily activities including how we live, work, and learn. 1. „How could someone gain access to online banking account? 2. „What would be the consequences of such access? Cont… Ethics is all about the principles of making right or wrong decisions. - Ethical principles needs to be respected and if not might result in legal consequences - The role of ethics in IS has become crucial - Many professionals have legal and ethical Cont.. some ethical and legal issues confronting the current digital world. –Privacy –Security –information gathering and –Digital ownership. Cont.. Privacy: information privacy has become a prime concern for everybody. – private information should be accessed using personal passwords.However, personal accounts such as email, social media, and private bank accounts, can be accessed by unauthorized sources. – It is morally wrong and unethical to view an individual’s private information in anyways which may also end up being a legal issue. Cont.. Digital Ownership: It is ability to access and/or use and protect data, information, and knowledge about ourselves or things we own – The expansion of digital mediums makes digital ownerships hard to control b/s it makes content easily copied and pasted online, It is unethical to use somebody else’s digital works without getting permission – Creators has right to allow or deny the use of the contents. Cont.. Information Gathering: Many IS applications collect users’ data and credentials as part of their operations. – Such information gathering trends can lead to many ethical and legal issues – Users need to understand and examine the intention of any information-gathering request by any service providers or third-party applications This protects against any illegal and fraudulent information stealing attempts Information security and liability – If and when a breach in information security happens, This might expose organizations and businesses to potential security liability. Such attempts might lead to identity theft, those used for malicious purpose –Accepted procedures and rules are needed to increase the reliability of information systems. – Users also need to report any security breach incidents Debate Government agencies monitoring citizen’s data A B Favor Against The expansion of accessible IS led to several significant changes in how society functions. which fills the digital divide gaps, use of advanced technologies changes how peoples act and react , and widespread use of digital Some negative social issues while using technological services and internet-based applications –Socializations Gaps It is also become common to see friends who are out in a cafe and still staring at a touchscreen rather than talking to one another. It is a practice of sending, posting, or disseminating unfavorable, hurtful, or malicious content about someone else online. It can also involve disclosing sensitive or private information about another individual in a way that causes embarrassment or humiliation. do you know any person/ organization affected by – Social Media and Gaming Addiction devoting so much time and effort to social media that it impairs other important life areas intensive online activity can negatively impact young people’s mental health Social medias and video games practices have direct links and impacts on students family – Cyber crime illegal ends, such as committing fraud, stealing identities, or violating privacy and intellectual property rights – Plagiarism – Plagiarism is presenting work or ideas from another source as your own, with or without consent of the original author, by incorporating it into your work without full acknowledgement. – Job opportunities and challenges The emerging technologies help to automate routine tasks which lead to improved quality of service. –On the other hand, it leads to loss of jobs because some types of jobs like cashiers, data entry clerks, and factory workers can be managed by automated systems 1.1.3 Environmental issues caused by Information Systems What is the impact of information systems on environmental pollution? Cont.. Technologies consume lots of resources and power electronic devices contain hazardous materials that are unsafe non-biodegradable materials, heavy metals, and toxic materials like cadmium, lead, and mercury which can leak into the ground, where they can Cont.. e-waste management refers to a systematic procedure for gathering e-waste, recovering and recycling material in a safe manner, and disposing of e-waste in a way that minimizes negative environmental effects Cont.. Negative impact of information systems on the environment have also led to the development of new environmentally This includes green or clean technologies Examples of green technologies includes Solar Panel, Electric Vehicles. smart meters, natural gas, wind Turbines etc. 1.1.4 Health Issues caused by information systems What are the potential impacts of using information systems on our health?  Health information system for program planning, review, and monitoring as well as generally ensuring and enhancing the quality of all components of the health system.  we must pay attention to health-related challenges that caused by unmanaged use  The challenges include, sleeping disorders and lack of productivity, loss of attention and stress back, neck, chest, arms, shoulders and feet, Vision Problems and eye strains, Headaches, Obesity due to long hour of sitting etc..  users should be aware of the proper ways when using IS 1.2. intellectual property  Proclamation No. 320/2003 “Intellectual property” means a legal right over a creative work of the human intellect and includes patent, trademark, registration certificate and copyright”.  Intellectual property is a category of property that includes intangible creations of the human Four types of intellectual property rights that are relevant to the software and information system industry. 1. Trade secrets 2. Patents 3. Copyrights on confidential information which may be sold or licensed. The unauthorized acquisition, use or disclosure of such secret information in a manner contrary to honest commercial practices by others is regarded as an unfair practice and a violation of the trade secret protection”. e.g. customer lists, source code, recipes for certain food items and beverages including Pepsi, Coca-Cola, and Sprite), software processes, and more. invention. Patents prevent others from making or selling an invention  software programs like Airbnb, Amazon, One-click, the page rank algorithm of Google, and other inventions including the light bulb, telephones, Bluetooth, and more.  Not all software products can have a patent.  The software has to meet certain standards to get a patent.  These standards come from the responsible authority in each country.  Copyrights and patents are not the same although people are often confused.  A copyright is a type of intellectual property protection that protects original works of authorship, which might include literary works, music, art, and more.  Nowadays, copyrights also protect computer software and architecture.  Copyright protections are automatic; once you create distinguishing the goods or services of one enterprise from those of other enterprises”. patents and copyrights can expire, trademark rights come from the use of the trademark, which can be held indefinitely. Like copyright, registration of a trademark is not required, but registering can offer additional  trademarks protect the words, phrases, symbols, logos, or other devices used to identify the source of 1.3. Digital Identity Management  Digital identities (online identities) allow systems, services, and apps to know who they are interacting with.  Management of a digital identity involves limiting the data that a person gives out, avoiding excessive use of storage, checking what data is stored about each individual, making corrections to incorrect personal data, avoiding redundant data, etc.  Digital identification can be verified in a variety of ways, including through database checks, document and identity verification, biometric verification, and identity verification.  A user can access internet services including banking, health, and travel after proving their identity.  National ID is a robust and reliable digital identification process for all Ethiopians and legal residents within the country.  Utilizing online resources enables students to work at their own speed, pursue interests, and engage with classmates while doing so  Digital collaboration means working with other individuals or teams and getting things done using digital devices and technology.  Digital collaboration uses technology to improve workplace collaboration, communication, document management, content management, and information flow across the organization which in turn leads to improved employee productivity and efficiency. Components of Digital Collaboration 1 People 2 Collaborative tools 2.1. Communication tools 2.2. Documentation & file sharing tool 2.3. Project management tools 2.4. Data visualization tools 2.5.Note taking tools 3 Devices  Communication tool: Communication tools include options for integrated messaging, co-working services, Privacy and access settings, Conference calling, Video chats with screen sharing etc. e.g. Microsoft Teams, Skype, Google Meet, Zoom, Cisco, Webex, Slack, Microsoft Yammer, and more  Documentation and file sharing tools: This tools includes features like Support for different file types, Comments, and notes attached to files, track changes and versioning, editing permissions and access control, folder sharing , and more. -->Examples- Google Drive, Google Docs, Dropbox, MS SharePoint, Media Fire, and more  Project Management tools: It has underlying project and task management capabilities at their core. Examples- Trello, Asena, ClickUp, and more.  Data Visualization tools: These tools should support a range of visual styles, be easy and quick to use, and be able to handle a significant amount of data. o Examples- Google Charts, Tableau, Power BI, Grafana, Chartist, FusionCharts, Datawrapper, Infogram and more.  Notetaking tools: These tools help to quickly capture and organize your notes, ideas, web page content and more. o Examples- Evernote, Microsoft OneNote and Google Keep and more.  According to aeseducation.com , digital citizenship refers to the responsible use of technology by anyone who uses computers, the Internet, and digital devices to engage with society on any level.  Good digital citizenship teaches peoples how to use digital tools to communicate with one another, empathize with one another, and build long-lasting connections.  Poor digital citizenship includes things like online bullying, careless social media use, and a general ignorance of Internet safety Digital citizenship goes beyond conversations about personal responsibility. It is about being active citizens who see possibilities instead of problems, and opportunities instead of risks as they curate a positive and effective digital footprint. Group Discussion unit summary key terms review question

Use Quizgecko on...
Browser
Browser