Lesson 1 - Introduction.pdf

Full Transcript

01 Introduction Social and Professional Issues IT 126 - BSIT 4A J.Montas 02...

01 Introduction Social and Professional Issues IT 126 - BSIT 4A J.Montas 02 To know the different Social Issues in the field of IT to provide solutions. OBJECTIVES To present strategies to prevent ethical abuse in the field of IT. To reduce challenges brought by ethical abuse in the field of IT. WHAT IS A 03 SOCIAL ISSUE? WHAT IS A 04 SOCIAL ISSUE? Social issues are topics or subjects that impact many people. These issues can include digital privacy, cybersecurity, online harassment, fake news propagation, the digital divide, and the impact of automation on jobs. WHAT IS SOCIAL 05 NETWORKING? Is the practice of using a dedicated online platform to maintain contact, interact and collaborate with like-minded individuals, peers, friends and family. Example: Facebook, Instagram, Youtube, X, Threads, Tiktok and etc. SOCIAL 06 NETWORKING ADVANTAGES DISADVANTAGES Networking Opportunities Addiction Information Sharing Mental illness Promotion and Marketing Frauds and Scams Awareness and Activism Misleading information Educational Resources Cyberbullying Job Opportunities Hacking Real-time Updates Privacy Issues [ADVANTAGES] 07 SOCIAL NETWORKING Networking Opportunities Social networking platforms allow individuals to connect with people from all around the world, breaking down geographical barriers. Information Sharing Users can share news, articles, videos, and other content easily, helping spread information quickly and widely. [ADVANTAGES] 08 SOCIAL NETWORKING Promotion and Marketing Businesses can reach a large audience through social networking for promoting their products and services, often at lower costs compared to traditional advertising. Awareness and Activism Social networking has been instrumental in raising awareness about social, political, and environmental issues, and mobilizing support for various causes. [ADVANTAGES] 09 SOCIAL NETWORKING Educational Resources Many educational institutions and professionals use social networks to share resources, research, and educational content, enhancing learning opportunities. Awareness and Activism Social networking has been instrumental in raising awareness about social, political, and environmental issues, and mobilizing support for various causes. Real-time Updates Users can receive real-time updates on current events, trends, and developments from their network and beyond. 10 BEST PRACTICES SAFE SOCIAL NETWO RKING Manage your privacy settings Remember: once posted, always posted Build a positive online reputation Keep personal info personal Protect your computer Know what action to take Use strong passwords Be cautious on social networking sites 11 BEST PRACTICES SAFE SOCIAL NETWO RKING Manage your privacy settings Learn about and use the privacy and security settings on your social networking sites. They help you control who sees what you post and manage your online experience in a positive way. Account details and security: ✓ Manage your passwords, login preferences and recovery methods. ✓ Manage your end-to-end encrypted chat settings. Audience settings: ✓ Block other profiles from seeing what you share or contacting you. ✓ Make what you share more private. ✓ ​ Review tags before they appear on your profile. 12 BEST PRACTICES SAFE SOCIAL NETWO RKING Remember: once posted, always posted Protect your reputation on social networks. What you post online stays online. Think twice before posting pictures you wouldn't want your parents or future employers to see. Recent research found that 70% of job recruiters rejected candidates based on information they found online. Build a positive online reputation. Recruiters respond to a strong, positive personal brand online. So, demonstrate your mastery of the environment and showcase your talents. 13 BEST PRACTICES SAFE SOCIAL NETWO RKING Keep personal info personal Be careful how much personal info you provide on social networking sites. The more information you post, the easier it may be for someone to use that information to steal your identity, access your data, or commit other crimes such as stalking. Protect your computer Security start with protecting your computer. Install Antivirus software. Keep your operating system, web browser, and other software updated. 14 BEST PRACTICES SAFE SOCIAL NETWO RKING Know what action to take If someone is harassing or threatening you, remove them from your friends list, block them, and report them to the site administrator. Use strong passwords Make sure that your password is at least eight characters long and consists of some combination of letters, numbers, and special characters (for example, +, @, #, or $). Be cautious on social networking sites Even links that look they come from friends can sometimes contain harmful software or be part of a phishing attack. If you are at all suspicious, don't click it. Contact your friend to verify the validity of the link first. FOURTH INDUSTRIAL 15 REVOLUTION (4IR) First industrial revolution Used water and steam power to mechanize production. The major shift of technological, socioeconomic, and cultural conditions in the late 18th century and early 19th century. Second industrial revolution (1871-1914) Electric power to create mass production. New innovations in steel production, petroleum and electricity led to the introduction of public automobiles and airplanes. FOURTH INDUSTRIAL 16 REVOLUTION (4IR) Third industrial revolution Electronics and information technology to automate production. The sweeping changes brought about by computing and communication technology, starting from circa 1950 with the creation of the first general-purpose electronic computers. Fourth industrial revolution Characterized by a fusion of technologies that is blurring the lines between the physical, digital, and biological spheres. The growing utilization of new technologies such as, AI, robotics, the IoT, autonomous vehicles, 3-D printing, nanotechnology, biotechnology, and quantum computing. INDUSTRIAL 17 REVOLUTION ADVANTAGES DISADVANTAGES Higher Productivity Inequality Improved Quality of Life Cybersecurity Risk New Markets Core Industry Disruptions Lower Entrepreneurship Barrier Ethical Issues WHAT IS DIGITAL 18 DIVIDE? The digital divide is a term that refers to the gap between demographics and regions that have access to modern information and communications technology (ICT), and those that don't or have restricted access. This technology can include the telephone, television, personal computers and internet connectivity. 19 DIGITAL DIVIDE TYPICALLY EXISTS BETWEEN: Those in urban areas and those in rural areas. The educated and the uneducated Socioeconomic groups The more and less industrially developing countries Even among populations with some access to technology, the digital divide can be evident in the form of lower-performance computers, lower-speed wireless connections, lower-priced internet use connections such as dial-up and limited access to subscription-based content 20 DIGITAL DIVIDE BRIDGING THE DIGITAL DIVIDE: Increase digital literacy Having good knowledge, skill, attitude, and behavior towards networked devices. Provide operational incentives to information and communication technology entities A non-governmental institution focused on teaching SMEs how to integrate computing into their operations. Government will chip in by minimizing the tax obligations of such institutions. Develop relevant and local content in addition telecommunications infrastructure The target audience should directly relate to the benefits they will enjoy from digital literacy. 21 DIGITAL DIVIDE BRIDGING THE DIGITAL DIVIDE: Encourage the establishment of cyber clubs Clubs or groups to dedicated to spreading digital literacy. Establishment of workable partnerships between ICT stakeholders Institutions should frequently and jointly drive various campaigns towards promoting digital literacy. Promote innovations geared towards overcoming the digital divide Promote innovative ways of doing business. 22 REFERENCES https://www.techtarget.com/whatis/definition/digital-divide#:~:text=The%20digital% 20divide%20is%20a,personal%20computers%20and%20internet%20connectivity https://www.technology.pitt.edu/security/best-practices-safe-social-networking https://www.guru99.com/what-is-big-data.html https://www.complete-it.co.uk/the-history-of-information-technology/#:~:text=Th e%20term%20IT%20did%20not,have%20a%2

Use Quizgecko on...
Browser
Browser