Module 1: Introduction to Information and Communication Technology PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This module introduces information and communication technology (ICT). It explores the history, uses, and impact of ICT in various aspects of modern life, including communication, job opportunities, and education. The document highlights how ICT reshapes the world.
Full Transcript
MODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY Lesson Objective: At the end of the module, the learners will be able to: After successful completion of this module, the student can be able to; Demonstrate a sense of readiness for the upcoming semester; Identify their learning o...
MODULE 1: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY Lesson Objective: At the end of the module, the learners will be able to: After successful completion of this module, the student can be able to; Demonstrate a sense of readiness for the upcoming semester; Identify their learning outcomes and expectations for the course; Recognize their capacity to create new understandings from reflecting on the course; Know the role and importance of ICT. Lectures and Annotations: The quickening pace of evolution in technology is very evident in this era. It seems that it is progressing faster than ever. From year to year, the evolution of technology is one of staggering promise and opportunity--as well as uncertainty. Basically, technology has been around before, and as long as there are people, information technology will be there also because there were always ways of communicating through technology available at that point in time. The future may be unknown, but digital advancement continues to reshape our world in ways that encourage people to form new habits, find new ways to work together, and become better human beings. And, in most cases, these changes translate into a range of opportunities and disruptions across every industry. Humans have always been quick to adapt technologies for better and faster communication. Lesson 1: Information and Communication Technology History of ICT ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing. Although there is no single, universal definition of ICT, the term is generally accepted to mean all devices, networking components, applications and systems that combined allow people and organizations (i.e., businesses, nonprofit agencies, governments and criminal enterprises) to interact in the digital world. Uses of ICT In Our Daily Lives Communication We all know that ICT take a major role for us by means of communicating, way back in the past our parents use to make letter and send it via post mail. But now with the help of ICT it is easier to communicate with our love ones. We can use cellular phones that design for communicating with other people even they are miles away far from you. Nowadays people are in touch with the help of ICT. Through chatting, E-mail, voice mail and social networking people communicate with each other. It is the cheapest means of communication. ICT allows students to monitor and manage their own learning, think critically and creatively, solve simulated real-world problems, work collaboratively, engage in ethical decision-making, and adopt a global perspective towards issues and ideas. It also provides students from remote areas access to expert teachers and learning resources, and gives administrators and policy makers the data and expertise they need to work more efficiently. Job Opportunities In the employment sector, ICT enables organizations to operate more efficiently, so employing staff with ICT skills is vital to the smooth running of any business. Being able to use ICT systems effectively allows employees more time to concentrate on areas of their job role that require soft skills. For example, many pharmacies use robot technology to assist with picking prescribed drugs. This allows highly trained pharmaceutical staff to focus on jobs requiring human intelligence and interaction, such as dispensing and checking medication. Nowadays, employers expect their staff to have basic ICT skills. This expectation even applies to job roles where ICT skills may not have been an essential requirement in the past. Nowadays, finding a job is different, you can just use your smart phone, laptop, desktop or any gadgets that is available in the comfort of your home. Education Information and Communications Technology (ICT) can impact student learning when teachers are digitally literate and understand how to integrate it into curriculum. Schools use a diverse set of ICT tools to communicate, create, disseminate, store, and manage information.(6) In some contexts, ICT has also become integral to the teaching- learning interaction, through such approaches as replacing chalkboards with interactive digital whiteboards, using students’ own smartphones or other devices for learning during class time, and the “flipped classroom” model where students watch lectures at home on the computer and use classroom time for more interactive exercises. When teachers are digitally literate and trained to use ICT, these approaches can lead to higher order thinking skills, provide creative and individualized options for students to express their understandings, and leave students better prepared to deal with ongoing technological change in society and the workplace. Socializing Social media has changed the world. The rapid and vast adoption of these technologies is changing how we find partners, how we access information from the news, and how we organize to demand political change. The internet and social media provide young people with a range of benefits, and opportunities to empower themselves in a variety of ways. Young people can maintain social connections and support networks that otherwise wouldn't be possible and can access more information than ever before. The communities and social interactions young people form online can be invaluable for bolstering and developing young people's self-confidence and social skills. As the ICT has become ubiquitous, faster and increasingly accessible to non-technical communities, social networking and collaborative services have grown rapidly enabling people to communicate and share interest in many more ways, sites like Facebook, Twitter LinkedIn You tube, Flicker, second life delicious blogs wiki’s and many more let people of all ages rapidly share their interest of the movement without others everywhere. But Facebook seems to be the leading areas of where people communicate and share their opinions. What a change! “Nothing is permanent, but change” (As Heraditus in the 4thcentury BC). Internet can be seen as the international networks of interconnection of computer networks, the main purpose for the institution of internet are quest for information i.e. browsing, electronic mail, knew groups fill transfer and access and use of other computer. Socialization can be seen as a process by which a child adapts a behavior to be an effective member of the society, which can only be achieved through learning or education. Impact of ICT in The Society Positive impacts of Information and Communication Technology Access to information: Increase in access to information and services that has accompanied the growth of the Internet. Some of the positive aspects of this increased access are better, and often cheaper, communications, such as VoIP phone and Instant Messaging. Improved access to education, e.g. distance learning and online tutorials. New ways of learning, e.g. interactive multi-media and virtual reality. New tools, new opportunities: ICT gives access to new tools that did not previously exist: digital cameras, photo-editing software and high quality printers, screen magnification or screen reading software enables partially sighted or blind people to work with ordinary text rather than Braille. Communication: Cost savings by using e.g. VoIP instead of normal telephone, email / messaging instead of post, video conferencing instead of traveling to meetings, e-commerce web sites instead of sales catalogues. Access to larger, even worldwide, markets. Information management: Data mining of customer information to produce lists for targeted advertising. Improved stock control, resulting in less wastage, better cash flow, etc. Security: ICT solves or reduces some security problems, e.g. Encryption methods can keep data safe from unauthorized people, both while it is being stored or while it is being sent electronically. ICT allows people to participate in a wider, even worldwide, society. Distance learning: students can access teaching materials from all over the world. ICT facilitates the ability to perform ‘impossible’ experiments’ by using simulations. Creation of new more interesting jobs. Examples would be systems analysts, programmers and software engineers, as well as help desk operators and trainers. Negative impacts of Information and Communication Technology Job loss: Manual operations being replaced by automation. e.g. robots replacing people on an assembly line. Job export. e.g. Data processing work being sent to other countries where operating costs are lower. Multiple workers being replaced by a smaller number who are able to do the same amount of work. e.g. A worker on a supermarket checkout can serve more customers per hour if a bar-code scanner linked to a computerized till is used to detect goods instead of the worker having to enter the item and price manually Reduced personal interaction: Most people need some form of social interaction in their daily lives and if they do not get the chance to meet and talk with other people they may feel isolated and unhappy. Reduced physical activity: This can lead to health problems such as obesity, heart disease, and diabetes. Cost: A lot of ICT hardware and software is expensive, both to purchase and to maintain. An ICT system usually requires specialist staff to run it and there is also the challenge of keeping up with ever-changing technology. Competition: this is usually thought of as being a good thing, but for some organizations being exposed to greater competition can be a problem. If the organization is competing for customers, donations, or other means of funding nationally or even internationally, they may lose out to other organizations that can offer the same service for less money. Overview The Netiquette and The Computer ethics discusses about the ethical issues in the field of computer. May it be in online or practicing in professional. LESSON 1: NETIQUETTE What is Netiquette? What is Netiquette? Simple stated, it’s network etiquette – that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life. In other words, netiquette is a set of rules for behaving properly online. Netiquette, or network etiquette, is concerned with the "proper" way to communicate in an online environment. Consider the following "rules," adapted from Virginia Shea's the Core Rules of Netiquette, whenever you communicate in the virtual world. When you use e-mail, instant messenger, video calls, or discussion boards to communicate with others online, please be sure to follow the rules of professional online communications known as netiquette. These rules will help you communicate with instructors, classmates, and potential employers more effectively and will help prevent misunderstandings. REMEMBER THE GOLDEN RULE – Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message. Make a good impression - treat others with the same respect that you would like to receive and avoid confrontational or offensive language. To help convey meaning when creating messages, it is sometimes acceptable to include appropriate emoticon symbols, such as a smiley face :) However, for professional communications these would be inappropriate. AVOID SLANG, ACRONYMS, AND TEXT TALK – Communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood. For example, use “your” instead of “ur”. AVOID “SCREAMING” IN TYPED MESSAGES – Typing an entire message using all capital letters is known as “screaming”. It is distracting and generally frowned upon in professional environments. It is better to draw emphasis to selected words or phrases by: using italic or bold text; using a different color for text or background color; or denoting emphasis using special characters (Example: **Important**). PROOFREAD YOUR MESSAGES BEFORE SENDING THEM – Proofreading your messages before you send them is a best practice for effective and efficient communication. Strive to make your communications concise and free of any: Spelling and grammar errors Confusing terms or phrases that could be misunderstood Errors of omission, such as missing content or recipients Errors in accuracy of information EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION WITH OTHERS ONLINE – E-mail and chat messages that you send or receive are considered private and should not be forwarded or copied to others without gaining the consent of all involved participants. In general, messages posted to discussion boards and social media sites can be read by the public. You may never know who might read or share what you post. It is a good practice to always ask a post’s author for permission before sharing a post with other parties. To protect your privacy and safety, do not share online any sensitive personal information such as: Your home address or phone number Personal conversations Social plans, such as vacations Financial information Usernames, passwords, or hints Anything personal that you would not want shared by others over the Internet If the material you share with others online came from another source, make every effort to gain permission from the original author or copyright holder. Copying someone else's work and passing it off as your own is plagiarism. It damages your reputation and could subject you to serious academic and legal consequences. RESPECT DIVERSITY IN VIEWPOINTS - Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation. When sharing a viewpoint that differs from someone else’s, it is a best practice to first acknowledge the other person by briefly restating what he or she said, but in your own words. This lets the person know that you are listening and trying to understand them. When presenting an opinion or criticism, it is helpful to use phrases that identify to whose point of view you are referring. If the opinion is yours, you can begin with the phrase “In my experience” or “In my opinion”. If it is a viewpoint of someone else, make sure you identify that in your message (Example: “According to Eric Ericson,” or “The president believes”). Ten Commandments of Computer Ethics Rule 1: Remember the Human When communicating electronically, whether through email, instant message, discussion post, text, or some other method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if someone else had written it?" Rule 2: Adhere to the same standards of behavior online that you follow in real life While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone face-to- face? On most occasions, no. Neither should you behave this way in the virtual world. Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriateq in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example? Rule 4: Respect other people's time and bandwidth Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download. Rule 5: Make yourself look good online writing.colostate.edu One of the best things about the virtual world is the lack of judgment associated with your physical appearance, sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) You will, however, be judged by the quality of your writing, so keep the following tips in mind: Always check for spelling and grammar errors Know what you're talking about and state it clearly Be pleasant and polite Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the ease in which information can be shared or accessed and in fact, this "information sharing" capability is one of the reasons the Internet was founded. So, in the spirit of the Internet's "founding fathers," share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references about your subject matter. Recently expanded your knowledge about a subject that might be of interest to others? Share that as well. Rule 7: Help keep flame wars under control What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While "flaming" is not necessarily forbidden in virtual communication, "flame wars," when two or three people exchange angry posts between one another, must be controlled or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction. Rule 8: Respect other people's privacy Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication. Rule 9: Don't abuse your power Just like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more expertise in technology or they have years of experience in a particular skill or subject matter. Maybe it's you who possesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human. Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum. LESSON 2: CYBERCRIMES What is Cyber? It is the Characteristics of the culture of computers, information, technology and virtual reality. Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense. Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet. Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal information. COMMON FORMS OF CYBERCRIMES: Copyright The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same. Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work. Plagiarism An act or instance of using or closely imitating the language and thoughts of another author without authorization. Computer Addiction Offline: generally used when speaking about excessive gaming behavior, which can be practiced both offline and online. Online: Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet. *Virtual Self -The persona you create about yourself virtually. CRIMINAL ACTIVITIES Hacking Unauthorized access of or interference with computer systems, servers, or other information and communication systems Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of such data Illegal Access Illegal Interception Data Interference System Interference Misuse of Devices Infection of IT Systems with Malware – if the act is committed against critical infrastructure of the Philippines the, penalty is between 12-20 years reclusion temporal Six years up to twelve years of imprisonment also known as prison mayor. Computer-related forgery, fraud and/or identity theft An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons. Phishing Pharming Spam Maximum of Php 200,000 fine or prison mayor Electronic theft Illegal Downloading Obtaining files that you do not have the right to use from the internet. Digital Piracy Practice of illegally copying and selling digital music, video, computer software, etc. Copyright Infringement Penalty of Php 50,000 – 500, 000 and or prison mayor Cyberbullying The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature. The Anti-Bullying Act of 2013 (RA 10627) Cybersex Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration. There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex. Penalty at least Php 200,000 and or prison mayor Child Pornography Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti- Child Pornography Act of 2009, committed through a computer system. Penalty of 12-20 years of imprisonment or reclusion temporal Cyber Defamation Is an unprivileged false statement of fact which tends to harm the reputation of a person or company. Penalty of 6-12 years of imprisonment or prison mayor. LESSON 3: INTERNET THREATS Hacking Hacking is a term used to describe actions taken by someone to gain unauthorized access to a computer. The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities. The process by which cyber criminals gain access to your computer. What it can do: Find weaknesses (or pre-existing bugs) in your security settings and exploit them in order to access your information. Install a Trojan horse, providing a back door for hackers to enter and search for your information. Malware Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware. What it can do: Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information. Reformat the hard drive of your computer causing you to lose all your information. Alter or delete files. Steal sensitive information. Send emails on your behalf. Take control of your computer and all the software running on it. Pharming Pharming is a common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website. What it can do: Convince you that the site is real and legitimate by spoofing or looking almost identical to the actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent. Phishing Phishing is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort. Fake emails, text messages and websites created to look like they're from authentic companies. They're sent by criminals to steal personal and financial information from you. This is also known as “spoofing”. What it does: Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action. Provides cyber criminals with your username and passwords so that they can access your accounts (your online bank account, shopping accounts, etc.) and steal your credit card numbers. Ransomware Ransomware is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed. The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements. What it can do: There are two common types of ransomware: Lockscreen ransomware: displays an image that prevents you from accessing your computer Encryption ransomware: encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them Ransomware will display a notification stating that your computer or data have been locked and demanding a payment be made for you to regain access. Sometimes the notification states that authorities have detected illegal activity on your computer, and that the payment is a fine to avoid prosecution. What you can do: Do not pay the ransom. These threats are meant to scare and intimidate you, and they do not come from a law enforcement agency. Even if you submit payment, there is no guarantee that you will regain access to your system. If your computer has been infected (i.e. you are unable to access your computer or your files have been encrypted), contact a reputable computer technician or specialist to find out whether your computer can be repaired and your data retrieved. In order to lessen the impact of a ransomware infection, be sure to regularly back-up your data with a removable external storage drive. It's possible that your files might be irretrievable; having an up-to-date backup could be invaluable. Spam Spam is one of the more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs. What it can do: Annoy you with unwanted junk mail. Create a burden for communications service providers and businesses to filter electronic messages. Phish for your information by tricking you into following links or entering details with too-good- to-be-true offers and promotions. Provide a vehicle for malware, scams, fraud and threats to your privacy. with viruses. Spyware (Spyware & Adware) Spyware and adware are often used by third parties to infiltrate your computer. What it is: Software that collects personal information about you without you knowing. They often come in the form of a ‘free' download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer What it can do: Collect information about you without you knowing about it and give it to third parties. Send your usernames, passwords, surfing habits, list of applications you've downloaded, settings, and even the version of your operating system to third parties. Change the way your computer runs without your knowledge. Take you to unwanted sites or inundate you with uncontrollable pop-up ads. Trojan Horses A Trojan horse may not be a term you're familiar with, but there's a good chance you or someone you know has been affected by one. A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded. What it can do: Delete your files. Use your computer to hack other computers. Watch you through your web cam. Log your keystrokes (such as a credit card number you entered in an online purchase). Record usernames, passwords and other personal information. Viruses Most people have heard of computer viruses, but not many know exactly what they are or what they do. Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of a virus. What they can do: Send spam. Provide criminals with access to your computer and contact lists. Scan and find personal information like passwords on your computer. Hijack your web browser. Disable your security settings. Display unwanted ads. When a program is running, the virus attached to it could infiltrate your hard drive and also spread to USB keys and external hard drives. Any attachment you create using this program and send to someone else could also infect them with the virus. How will you know if your computer is infected? Here are a few things to check for: It takes longer than usual for your computer to start up, it restarts on its own or doesn't start up at all. It takes a long time to launch a program. Files and data have disappeared. Your system and programs crash constantly. The homepage you set on your web browser is different (note that this could be caused by Adware that has been installed on your computer). Web pages are slow to load. Your computer screen looks distorted. Programs are running without your control. If you suspect a problem, make sure your security software is up to date and run it to check for infection. If nothing is found, or if you are unsure of what to do, seek technical help. Wi-Fi Eavesdropping WiFi eavesdropping is another method used by cyber criminals to capture personal information. Virtual “listening in” on information that's shared over an unsecure (not encrypted) WiFi network. What it can do: Potentially access your computer with the right equipment. Steal your personal information including logins and passwords. Worms Worms are a common threat to computers and the Internet as a whole. A worm, unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in your computer memory, doesn't damage or alter the hard drive worms are a common computer and the internet as a whole a company of the internet itself. What they can do: Spread to everyone in your contact list. Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking havoc on an internal network and costing companies’ enormous amounts of lost revenue. Lesson Title: MODULE 5: DIGITAL TECHNOLOGY AND SOCIAL CHANGE Lesson Objective: At the end of the module, the learners will be able to: Explain the role of ICT in social change. Identify the strengths, weakness, opportunities, and imminent threats of the digital age. Articulate basic, but fundamental definitions of complex issues and dynamics that human encounter every day, such as technology, social progress, development, and digitalization. Lectures and Annotations: Overview The internet and telecommunication industry in the 1990s changed the way we connect and exchange information. Digital technology impacted people in many ways. By the way people live, work, learn, and socialize. Digital technology comprises of electronic tools, devices and systems that generate, store and process data. It enables us to experience the benefits of advanced information technology systems. Such as efficiency and productivity, improved communication and collaboration and faster acquisition of information. In this lesson, we will discuss the digital age and its effect in society, the two-essential theory in technology, and how technological change takes place. LESSON 1: INTRODUCATION TO THE DIGITAL AGE Digital age, also known as Information age, is a period when the computer and internet were introduced. It is caused by rapid shift from traditional industry to computerization all the way to artificial intelligence which brought by Industrial Revolution. These technologies enabled people to communicate information easily and rapidly. Digital Technology became prevalent and widely used around the world. Information can be accessed easily specially with the use of the internet. House chores and jobs are getting automated with the help of machines and equipment. Mobile phones became very useful in every areas of life --- in education, entertainment, jobs, etc. Digital technologies have radically changed the way people work, consume, and communicate over a short period of time. The ICT and its role in Social Change Information Communications Technology (ICT) has the power to transform society. ICT is defined as a group of interrelated technologies (electronic devices) for accessing, processing, and disseminating information. It is a system of electronic network activated through a complex hardware and software systems linked by a vast array of technical protocols. ICTs are indisputably important part of our social setting today. The term ICTs has been used to embrace technological innovation and merging in information and communication transforming our world into information or knowledge societies. The rapid development of these technologies has fainted the boundaries between information, communication, and various types of media. The development of a society mostly depends on the access to information. The Information and Communication Technologies (ICTs) greatly ease the flow of information and knowledge offering the socially marginalized community an extraordinary chance to attain their own rights socially, economically, educationally, and politically. Despite ICT’s massive potential, the current global information outburst has had surprisingly little impact on development activities and access to practical information for rural communities, local people, and forefront development workers in developing countries. The emergence of Internet, World Wide Web, mobile cell phones, digital television, and several other new electronic devices pertaining information and communication technologies (ICTs) are opening a fresh passageways for transforming the way we live, work, learn, communicate and also provides a strategic opportunities of diverse and significant social and economic benefits to people across the globe. It also enables financial inclusion through m- commerce and allows people to connect with millions instantaneously. Social change refers to a transformation of culture and social organizations/structures over time. We are aware that in a modern world, a society is never static and that of social, political, economic, and cultural changes occurs constantly. The social transformations that could result from the increasing use of ICTs depend strangely on verdicts made by organizations and individuals outside our household, many of whom have great economic leverage, political power or technical expertise. To increase the consent potential of ICTs, it is important to understand some of their basic features, which make them a unique kind of technologies. Entertainment With the advent of new technologies, the world of entertainment is constantly evolving. Digital broadcasting has completely changed the way we experience television and radio. Cinema can now be found at the comfort of your home through application such as Netflix, iFlix, etc. We get entertained by the content that we see in Facebook, YouTube, and Instagram. Computer gaming has also been an important influence in the development of graphical interfaces. Technology has been at the forefront of changes in production and distribution of music. We can now listen to music and podcast using Spotify. These are some of the many technologies we use for entertainment that arise in the Digital Age. Business The impact of ICT on business is particularly significant. It empowers people to share knowledge and advice instantaneously and set up an online shop or website at a low cost, dramatically lowering the barriers to starting a business. As such, ICT maturity is closely linked to economic growth. Businesses in today’s life have promoted a lot with the coming of ICT. Its impact cannot be over emphasized. For example, ICT helps to increase productivity in business with the use of social Media platforms for marketing and promotion. The use of websites now allowed companies to develop new and cheaper ways of offering customers with opportunities of buying goods and services at their convenient time and enhance the level of customer service. Online platform has been the marketplace where people can transact and communicate. The impact of ICT infrastructure on social businesses cannot be understated. It has made social impact affordable, social impact scalable, and enables new ways to connect to and engage with local communities. Education The impact of ICT on teachers, trainers, learners, researchers and the entire education society is tremendous. It is changing the way of the education delivery system in the world by enhancing access to information for all. It also ensures effective and inclusive education. ICT supports the concept of open learning where the thrust is upon enhanced student access and the development of student autonomy. ICT can play varied roles in developing an effective learning environment. It assists teachers and helps explain core content concepts and addresses misconceptions. It acts as a stimulant and fosters analytical thinking and interdisciplinary studies. It networks a learner with the peers and experts and develops collaborative atmosphere. It plays the role of a guide and mentor by providing tailor made instructions to meet individual needs. Online learning facilitates learning through digital mode. With the help of multimedia, it enhances effectiveness of teaching-learning and hence proves crucial for early learners, slow learners and differently abled learners. Modern ICT tools not only deliver the content but also replicate formal learning experience via virtual learning. The intention of virtual classrooms is to extend the structure and services that accompany formal education programs from the physical environment to learners. ICT also addresses the need of mobile learning. It offers independent space and flexibility that comes from working away from the learning institute or tutor. It makes education accessible to all, irrespective of geographical barriers or resource constraints. Learners from remote areas, working people who want to learn further and update their knowledge and differently abled who find travelling an issue of concern – benefit from the mobile learning mode. Digital resources in classrooms can help prepare students for a digital society and economy Digital technologies can unlock new learning opportunities in the classroom by giving students access to a wider range of resources, by complementing the teacher in learning processes (computer-assisted learning) and by providing other advantages to students, such as access to motivational and informational resources associated with access to tertiary education programs.. Access to technology is quite certainly beneficial to students’ digital skills and provide a clear advantage to students in that area. But the effects on other learning outcomes are generally considered limited or potentially negative. Some studies find that computer-assisted learning has some positive effects, especially in science and mathematics, because it provides students with personalized learning modules that are adapted to their level. Jobs and earnings Beyond income security, employment fulfils a number of important roles for human wellbeing, such as time structure, social contact, a sense of purpose, a valued social position as well as an opportunity for skill use. For this reason, the labor market effects of the digital transformation are among the most significant for people’s well-being. The digital transformation has the potential to generate substantial changes in the composition of the labor market as jobs that require certain skillsets are replaced by a combination of technology and higher skilled labor, or even completely automated. At the same time, digitalization yields opportunities by creating employment in new and existing industries, with greater job-to-job mobility facilitated by online job search tools. The digital economy also fundamentally changes the nature of work for many people, with fewer jobs exerting physical demands on workers but more jobs placing an emotional strain on desk-workers. New jobs in ICT and in other sectors become available. Despite fears for the automation, there is little evidence so far that technological change has led to a net loss of jobs. There are theoretical reasons for which technological progress may contribute to job creation. Efficiency gains and cost-savings may induce job creation within industries by expanding the market and therefore increasing demand. Increased productivity in one sector can also have positive spillovers in other sectors, if this translates into lower prices and higher demand across the economy. While these processes may imply short-term unemployment among displaced workers, they have the potential to generate economy-wide employment gains. Digital technologies may destroy jobs at risk of automation While the previous section has pointed to the lack of evidence of the negative effects of technological change on total employment so far, a number of authors have argued that ICT- based technological change will be more profound than previous instances of great technological change. This argument is mainly supported by the observation that the labor- saving potential of digital technologies is far greater than in the case of previous technological changes. As a result, automation may, in the future, have much more impactful consequences on the need for human labor than it has so far. For the moment, while a shift away from manufacturing jobs has been observed, this has not translated to overall losses in employment, as middle-skill jobs have been replaced by new high-skill and low-skill jobs. Concern of the automation of jobs are warranted, however, at least in order to make the case for the need to invest in the most appropriate skills for the future digital economy. Thus far, estimates of the impact of automation mainly rely on expert’s predictions of the types of tasks that are likely to be replaced by machines. Previous estimates by Autor, Levy and Murnane (2003) quickly proved to be too cautious: tasks that Autor et al. considered to be out of reach for machines, such as truck driving, are already being threatened by rapid advances in machine learning and AI. More recent estimates of the potential job- displacement effects of automation have looked at job tasks rather than entire job categories. Food preparation assistants, cleaners and helpers, laborers in mining, construction, manufacturing and transport, and assemblers are the most likely to see their job tasks automated, while teaching professionals, health professionals and personal care workers are among the least likely to lose their job to a machine. Similarly, Schwab (2016) and Susskind and Susskind (2015) consider that the work of lawyers, financial analysts, journalists, doctors or librarians could be partially or totally automated. Schwab (2016) emphasizes that algorithms made available by AI are able to successfully replace human actions, even creative ones. The author presents the example of automated narrative generation, in which algorithms can conceive written texts for particular types of audience. Teleworking (Work from Home) allows people to save time and combine their work and personal lives Teleworking (Work from Home), on the other hand, may present an opportunity for work-life balance as it improves time management and may reduce time spent commuting. A variety of studies have found that employees who engage in telework have higher job satisfaction. Among positive effects, teleworkers report reduced commuting times, more flexibility in organizing their working time, and better overall work-life balance. Evidence from the American Time Use Survey shows that reductions in the time spent commuting and in-home production due to Internet increase labor force participation. Health Digitalization can affect people’s health status through the emergence of new physical and mental health risks and through its impact on the health-care delivery system. Health risks associated with the digital transformations include mental health problems associated with the extreme use of digital technologies, especially among children and teenagers and the crowding out of other activities such as physical exercise. Health-care delivery is also affected by new digital technologies, such as electronic records, new treatment options, tele- care, and teleconsultation. An important aspect of digitalization concerns the production and use of medical data to improve the effectiveness and efficiency of health systems. As a caveat, the exchange and use of medical and health data must meet high data protection and data security standards, considering its sensitivity. How and where care is delivered is also affected by digital innovations, which challenges the traditional role of care providers, with implications for interactions among care providers and between providers and patients. The effects of these changes in healthcare delivery of health inequalities are potentially large, but also less well documented. Extreme use of digital technologies may have negative mental health effects The effects of mobile phones, video games, and the pervasiveness of ubiquitous screens on the mental health of children and teenagers have drawn significant attention in the public debate because they may present risks of addiction. Extreme Internet use, defined as children who spend more than 6 hours on the interned outside of school, is becoming more common among children and teenagers, with time spent online by 15-year-olds increasing by about 40 minutes between 2012 and 2015 on average. A study also found that the iGeneration members (the generation grown up in an environment where technology is ubiquitous) check their social media accounts on average every 15 minutes. While video games used to be the primary source of extreme use of digital technologies, the smartphone has extended this risk to a wider range of applications. A recent study found that 39% of 18- to 29-year-olds in the United States are online “almost constantly” Research suggests that the Internet triggers neurological processes similar to other addictive substances and activities, i.e. experiences of short-term pleasure in the brain’s “reward center”. This area releases a combination of dopamine, opiates and other neurochemicals when activated, a mechanism that can be compromised over time due to the deterioration of associated receptors, requiring even more stimulation to get a similar response. Children and teenagers, for biological reasons, are more susceptible to addiction because their brain is still in development. For example, a study among 14-year-olds in Belgium found that frequent gamers had brain abnormalities compared to other teens, potentially resulting from dopamine releases associated with video games. There is evidence of a direct link between extreme Internet use and depression and anxiety, but the nature of this relationship is disputed and is likely to be bi-directional, as people with anxiety, depression and other mental health problems are also potentially more likely to spend time online. A longitudinal study run on 3 000 children in Singapore found that extreme video game use and problems such as social phobia, attention deficit disorder, anxiety and depression often occur together and are likely to be mutually reinforcing. Theories in Technology Technological Determinism It is the theory which strongly believe that technology shapes the culture, values, social structures of a society. The main reason why society progresses is because of the kind technology the society has. Technological innovation is the cause of the social progress. The technology has the control over the society --- over human actions, culture and values. Technology greatly influences human thought and action. In other words the society is changing because of technology. According to Winner, technology is not the slave of the human being but rather humans are slaves to technology as they are forced to adapt to the technological environment that surrounds them. Example. The Medium is the Message by Marshall McLuhan. The technology which is used as a channel of communication matter more than the content. Example. The invention of the stirrup. It is the foot support for horse-riders. Before its invention, riders were not able to use swords while riding in a horse because they may lose balance. When the stirrup was invented, it enabled armored knights to fight on horseback. Because of this, it brought the development of feudal societies --- a military rule by nobles or lords Example. The invention of gun. Before, the weapons used were swords and archery --- soldiers had to be skilled and trained in using these weapons. But a new invention in technology changed it all. A gun was invented which require a less effort and can be used even from far distances. This technology changed the way soldiers are trained. It also changed how soldiers fight in a war. Social Constructivism Social Constructivism is the opposite of the Technological Determinism. Social Constructivism believes that humans play a main role in shaping technology rather than technology shaping society. It believes that technology does not determine human action, but rather, human action shapes the technology. Our curiosity, the hunger to expand, and the need to do things efficiently drive us to create these technologies. Technological Change Technological change means the technical knowledge used in the production of capital and machinery. The various changes in technology leads to an increase in the productivity of labor, capital and other production factors. Technological progress comprises of creation of skill, new means of production, new uses of raw materials and the widespread use of machinery. The technology is the most powerful means of wresting power from nature in all possible ways. It strengthens the facilities of man. Prof. Frankel assumes that the, “Technological change is not a mere improvement in the technical know-how. It means much more than this. It should be preceded by sociological change also, a willingness and desire on the part of community to modify their social, political and administrative institutions so as to make them fit with new techniques of production and faster tempo of economic activity.” Technology, according to J. P. Dewhurts, in fact, can be thought of as the change in the production process of material and human skills. Process of Technological Change Technological changes devise new goods and techniques of production. The development of new technical knowledge can be defined as the growth of the new technique that can produce goods and services at lesser cost of production. The process of growth of technical knowledge can be divided into following stages: Formulation of scientific principles Application of these principles to give technical problems Development of technical inventions to the point of commercial exploitation. The first stage is the advancement in scientific knowledge, the second is that of the application of this knowledge to some useful purposes and third is the commercialization of invention which is called innovation. This has a great significance in the process of development. Schumpeter has distinguished between invention and innovation. Invention implies the discovery of new technique while innovation is practical application of invention in production for market. It may be called commercialization that originates from scientific advancement. Invention is scientific fact while innovation is economic fact. Inventions are carried on by the inventors large capital investments at every stage as it needs not only a scientific attitude but an attitude of the community and an entrepreneurial skill of high order with the ability to understand the possibilities of employing scientific incentives for commercial purposes.