🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Living in the IT Era.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

LIVING IN THE IT ERA Instructional Material for GEE1 Abstract In [Email address] Authors: Frederick Patacsil Pauline Joy Roa Kathleen De Guzman Leah Rodri uez Wenna Lyn Honrado Ferdinand Mata Ma...

LIVING IN THE IT ERA Instructional Material for GEE1 Abstract In [Email address] Authors: Frederick Patacsil Pauline Joy Roa Kathleen De Guzman Leah Rodri uez Wenna Lyn Honrado Ferdinand Mata Ma. Jo Ann Ventura 2 Living in the IT Era Course Description This course covers Science, Culture and Ethics of Information Technology. It likewise provides the students an understanding on the influence of information technology on modern living and human relationships as well as its uses for personal, professional, and social advancement. The course will also provide a better understanding about different ethical and social principles in relation to Information Technology and how we can apply these principles to make sound judgement in analyzing real world issues. Course Outcomes The following are the expected course outcomes for GEE 1. 1. Discuss the ethical and social impact of Information Technology today. 2. Discuss the transnational and social issues relating to the use and misuse of Information Technology. 3. Develop critical thinking and logical reasoning 4. Apply the different ethical theories and principles on analyzing and solving real world issues. 5. Understand the current status of information technology in the country. 3 Table of Contents Chapter 1 – Introduction to the Information and Communication Technology.............. 5 Chapter 2 – The Web and the Internet..............................................................................14 Chapter 3 – Digital Technology and Social Change........................................................24 Chapter 4 - Overview of Ethics..........................................................................................31 Chapter 5 - Ethical Issues in Digital Age..........................................................................36 Chapter 6 - Privacy.............................................................................................................42 Chapter 7 - Freedom of Expression..................................................................................51 Chapter 8 – Social Networking..........................................................................................56 Chapter 9 –The Impact of IT on Productivity and Quality of Life....................................64 4 Chapter 1 – Introduction to the Information and Communication Technology MODULE OVERVIEW In this chapter, we will look at the notion of Information and Communication Technology (ICT), as well as its evolution and nature. We will also learn about the practical applications of ICT in daily life, the effects of ICT in many areas of expertise, as well as current trends and innovative technologies. MODULE LEARNING OBJECTIVES At the end of this, students are expected to: Understand the evolution of technology over the years Explain how technology can be used in several aspects of the society Discuss the impact of technology in different areas of specialization Identify the current trends in technology LEARNING CONTENTS (Evolutions of Information and Communication Technology) “Information and Communication Technology” (ICT) is a term used to describe technologies in manipulating and communicating information. ICT is used especially in relation to modern telecommunication systems as they have evolved to the intensive use of computing technology, coupled with the enormous increase in communications between computers relying on the telecommunications infrastructure to do so. The two areas, ICT and telecommunications, have increasingly merged as telecommunications moved from analog-to-digital and then to packet technologies, and as the internet has emerged to become one of the dominant data communications systems in use today. The very first forms of ICT, together with what we have currently, make up for the technologies that we experience today. The evolution of the first ICT to our current form of ICT goes through 4 stages: Pre-mechanical, Mechanical, Electromechanical, and Electronic. These 4 stages helped ICT evolve and adapt to the latest forms of ICT. 1. Pre-mechanical The pre-mechanical age of technology is the earliest known form of ICT that occurred between 3000 B.C. and 1450 A.D. This is when the first human communications were observed; communications included trying to use simple symbols and pictures, known as petroglyphs, which were usually carved into rock formations. These petroglyphs made up stories, messages, and warnings. 5 Early alphabets were also developed such as the Phoenician Alphabet. As alphabets became more popular and more commonly used for writing information down, pens and paper began to develop. It started off as marks on wet clay, but later on, paper was created out of papyrus plants. Since people were writing a lot of information down, they needed ways to keep it all in storage. This is where the first books and libraries were developed. Egyptian scrolls were one popular way of writing down information permanently. Some people were binding information together in book form. 2. Mechanical The mechanical age occurred between 1450 and 1840. This when we first start to see connections between our current technology and its ancestors. More technological advancements were made during this time. Inventions included the slide rule (an analog computer used for multiplication and dividing). The Pascaline, a hugely popular mechanical computer, was created by Blaise Pascal. Charles Babbage created the difference engine, which used the method of finite differences to tabulate polynomial equations. Other devices were developed during this period; but, unlike current calculators, these machines could only perform one sort of computation at a time. The sizes of machinery in the mechanical period and the modern day are also incomparable. 3. Electromechanical The electromechanical age encompasses the years 1840 to 1940. We are finally coming close to certain technologies that are like what we have now. These are the preliminary stages of telecommunications. In the early 1800s, the telegraph was created. In 1835, Morse code was created by Samuel Morse. In 1876, Alexander Graham Bell made the telephone, one of the most popular forms of communications used up until today. The first radio was developed by Guglielmo Marconi in 1894. These technologies are extremely crucial to our modern technology; this led to big advances in the information technology and telecommunications field. After the creation of fundamental telecommunications technology, computing machines soon followed. The first large scale automatic digital computer was the Mark 1; this was created by Harvard University’s staff in the 1940s. This computer was 8 ft. high x 50 ft. long x 2 ft. wide and weighed 5 tons. It was programmed using punch cards. It was from huge machines like this that people began to look at downsizing all the parts to first make them usable by businesses and eventually in your own home. 4. Electronic (Our Current Technology) 6 The electronic age is what we currently live in. It can be defined as the time between 1940 and right now. There are 4 main sections of digital computing. The first was the era of vacuum tubes and punch cards like the ENIAC and Mark 1. Rotating magnetic drums were used for internal storage. The ENIAC (Electronic Numerical Integrator and Computer) was the first high-speed, digital computer capable of being reprogrammed to solve a full range of computing problems. This computer was designed to be used by the U.S. Army for artillery firing tables. This machine was even bigger than the Mark 1, taking up 680 square feet (about twice the area of a parking space) and weighing 30 tons. It used vacuum tubes to do its calculations. The second generation replaced vacuum tubes with transistors, punch cards with magnetic tape, and rotating magnetic drums with magnetic cores for internal storage. During this time, high-level programming language, such as FORTRAN and COBOL, were created. Transistors were replaced by integrated circuits in the third generation, magnetic tape was utilized in all computers, and magnetic core was replaced by metal oxide semiconductors. Around this time, a true operating system appeared, along with the advanced programming language BASIC. The fourth and most recent iteration included CPUs (central processing units) that integrated memory, logic, and control circuits on a single chip. Personal computers were created (Apple II). In addition, a graphical user interface (GUI) was created. LEARNING CONTENTS (Practical Application of ICT in Everyday Life) Information and Communications Technology have multiple practical applications in everyday life. These are the following: a) EDUCATION Today, most schools and higher educational institutions have computers in the classroom for teachers and students. Teachers, students, researchers, and school administrators benefit from the usage of ICT. b) BANKING The computer is the nerve center of the banking system around the world. It functions to control the entire banking system that also includes ‘Electronic Banking Services.’ Electronic banking provides 24-hour services. The services include: a. Automated Teller Machine (ATM) b. Cheque Deposit c. Electronic Fund Transfer 7 d. Direct Deposit e. Pay by phone system f. Personal computer banking/internet banking In the banking sector, customers, businessperson, and bank administrator benefit from the usage of ICT. c) INDUSTRY Computers are used to facilitate production planning and control systems, to support chain management, and to help in product design in the industrial sector. In the industrial sector, workers, researchers, and administrators benefit from the usage of ICT. d) E-COMMERCE E-commerce helps in boosting the economy. It makes buying-and-selling activities easier and more efficient. For this application, computers, internet, and shared software are needed. In the e-commerce sector, customers, suppliers, and employees benefit from the usage of ICT. BEFORE ICT (non- WITH ICT (computerized) computerized) Learning Management Systems (LMS) are used; Traditional – Chalk and talk online classes are strengthened through online EDUCATION systems. Collaboration is emphasized Using only book and through digital sharing of paper/magazine books and other documents. Banking was done manually All transactions are done by taking deposits directly. digitally. Transactions can only be transaction can be done at BANKING made during working hours. any time and place through SYSTEM mobile banking, and other means. It takes time to approve any Online services, phone loan applications. banking system, credit cards are available. 8 Computers and telecommunications industry Production was slow became exceedingly popular INDUSTRY because everything was and done manually and dependent on human labor. profitable since production can be increased through an all-day operation. Commerce is an activity of exchanging, buying, and selling commodities on a large scale, involving transportation from place to place. Trading was done using the E-commerce plays a vital role barter system; this later COMMERCE in the economic scene. This developed into currency. includes the electronic Advertisement was in the distribution, buying, selling, form of word of mouth, and servicing of products. billboards, and printed flyers. Trading globally was extremely slow and expensive. Traders had to find ways to market local products in the global market. LEARNING CONTENTS (Impact of ICT in Different Areas of Specialization) FASTER COMMUNICATION SPEED In the past, it took a long time for news or messages to be sent. Now with the internet, news or messages are sent via e-mail to friends, business partners, or to anyone efficiently. Social media has also increased the spread of news and information. With the increased bandwidth capability and connection speed on the internet, any information can travel fast and instantly. LOWER COMMUNICATION COST Using the internet is less expensive than other modes of communication such as telephone, mailing, or courier services. It enables people to gain access to enormous amounts of data at an extremely low cost. Basic internet services are also provided at little or no cost. Furthermore, the cost of connecting to the Internet is low. RELIABLE MODE OF COMMUNICATION 9 Computers are a reliable communication tool. Information may be accessed and retrieved from anywhere and at any time using computers and computer networks. EFFECTIVE SHARING OF INFORMATION People all over the world can now share information thanks to advances in ICT. People can share and exchange opinions, news, and information on the Internet by using discussion groups, mailing lists, online forums, and social media. This facilitates knowledge sharing, which aids in the development of a knowledge-based society. PAPERLESS ENVIRONMENT The term "paperless environment" was coined by ICT technology. This refers to the ability of information to be stored and retrieved digitally rather than on paper. Online communications, such as e-mail, online chat, and instant messaging, also contribute to the creation of a paperless environment. BORDERLESS COMMUNICATION The Internet provides quick access to information, interactivity, accessibility, and versatility. It has evolved into a borderless provider of services and information. Through the internet, information and communication can cross borders. SOCIAL PROBLEMS ICT has various negative consequences. It has caused societal issues in society. People nowadays prefer internet communication over face-to-face interactions. Individualism and introversion grow increasingly prevalent in people as they age. Multiple studies have also shown that increased social media have a strong link with negative self-perception. HEALTH PROBLEMS A computer can be harmful to people if they use it for lengthy periods of time. Users of computers are also subjected to poor posture, eyestrain, and physical and emotional stress. An ergonomic computing environment might be utilized to tackle these health issues. For example, an ergonomic chair can reduce back strain and a screen filter can minimize eye strain. LEARNING CONTENTS (Current Trends and Emerging Technologies) Technology is expanding at such a fast pace nowadays, allowing for faster development and advancement in society. 1. Artificial Intelligence (AI) and Machine Learning Artificial Intelligence is a method of making a computer think intelligently like the human mind. AI is carried out by studying the patterns of the human brain and by analyzing its cognitive process. Using AI is essential in the development of intelligent software and systems. The following are tasks processed by AI-enabled devices: Speech Recognition 10 Object Detection Predictive Evaluation and Anticipating Analytics Smart Devices Machine Learning is a subcomponent of Artificial Intelligence. ML applications learn from previous data or previous experience through supervised or unsupervised learning. When the ML application is exposed to new data, these applications learn, grow, change, and develop by themselves. ML involves computers finding useful information without letting them know where to look. Instead, ML leverages different algorithms that learn from data using an iterative process. 2. Robotic Process Automation (RPA) Robotic Process Automation is the application of artificial intelligence (AI) and machine learning (ML) in software capable of handling high-volume, repeatable tasks that previously required human labor. Some of these tasks include: Addressing queries Making calculations Maintaining records Making transactions RPA is useful in manufacturing industries. 3. Edge Computing Edge computing is designed to solve some of the latency problems caused by cloud computing. It exists “on the edge closer to where there is a need for computing. Because of this, edge computing is used in real-time or time-sensitive data processing in remote locations with limited-to-no connectivity to a central location. In these scenarios, edge computing is utilized as mini data centers. Edge computing will increase as use of Internet of Things (IoT) devices increase. 4. Quantum Computing Quantum computing takes advantage of quantum phenomena, including superposition and quantum entanglement. Quantum computing is applied in banking and finance, such as for issues in fraud detection and credit risk management. This technology is also involved in preventing the spread of the coronavirus; it helps in the development of potential vaccines and the management of epidemics, thanks to its ability to easily query, monitor, analyze and act on data. Quantum computers are now faster than regular computers; multiple companies such as Microsoft, AWS, Google, and many others are making innovations in the field of quantum computing. 5. Virtual Reality and Augmented Reality 11 Virtual Reality (VR), Augmented Reality (AR), and Extended Reality (ER) are the most often used technologies for environment simulation. VR immerses the user in a virtual environment, while AR augments the user's real-world circumstances. Although this technology trend has primarily been used for gaming thus far, it has also been used for training, as with Virtual Ship, a simulation software used to train U.S. Navy, Army, and Coast Guard ship captains. 6. Blockchain A blockchain is a public and chronologically-ordered series of documents called blocks. Encrypted information is done through cryptography; the encrypted information ensures that user privacy is not compromised and data cannot be altered. Unlike modern financial institutions, blockchain network information is not controlled by a centralized authority. The network's participants maintain the data, and they have the democratic ability to authorize each transaction that can occur on a blockchain network. 7. Internet of Things (IoT) The Internet of Things (IoT) refers to the connectivity of computing devices embedded in ordinary things that allow them to send and receive data. Sensors are installed on IoT devices to collect data from their surroundings. Environmental data is used to trigger and make automated judgments in this manner. Consumer-level application of these devices include placing them on phones and appliances, medical and fitness equipment, livestock, and more. On an industrial level, these devices can be used for machineries, shipping equipment, vehicles, robots, warehouses, and others. But the location of these devices matters less than what they do. IoT devices “talk” to each other by sharing data and getting feedback based on said data. These data include those that are generated, analyzed, and acted on by other devices connected through the internet. 8. 5G 5G services improve the bandwidth capabilities and network latency of computer networks. This is expected to revolutionize our lives, by enabling services that rely on advanced technologies like AR, VR, and cloud-based services. Cloud-based gaming companies like Google Stadia, NVidia GeForce Now and much more will further improve their performance through 5G. 5G will also be used in factories. An example of this is the use of camera security systems using 5G; this help improve safety and traffic management, smart grid control, and smart retail. 9. Cybersecurity Cybersecurity focuses on defending devices and services from electronic attacks by hackers.IT professionals focus on removing the offensive components of computer networks, and improving network security for network nodes, such as computers and smartphones, and databases. 12 LEARNING ACTIVITY 1 Exercises: a. Answer the following questions: 1. What is ICT? 2. List down the different technologies invented in different computer generations. 3. How does ICT affect your life? b. Watch the videos (click the link) below and write your thoughts about the subject matter. 1. ICT in everyday life. https://www.youtube.com/watch?v=ZDNkhRuQNKs 2. Artificial Intelligence. https://youtu.be/ad79nYk2keg 3. Robotic Process Automation. https://youtu.be/H5VKUajGDdI 4. Block Chain Technology. https://youtu.be/E2JRnFgrztM 5. Cyber Security. https://youtu.be/z5nc9MDbvkw SUMMARY ICT stands for information, communication, and technology. The evolution of ICT goes through stages, namely: (1) Pre-mechanical, (2) Mechanical, (3) Electromechanical, and (4) Electronic. The different application of ICT in our everyday life embraces education, banking, industry, and e-commerce. The effect of ICT in different areas of specialization are the following: (1) faster communication speed, (2) lower communication cost, (3) reliable mode of communication, (4) effective sharing of information, (5) paperless environment, (6) borderless communication, among others. The current trends and emerging technologies include the following: (1) Artificial Intelligence, (2) Machine Learning, (3) Robotic Process Automation, (4) Edge Computing, (5) Quantum Computing, (6) Blockchain, (7) Internet of Things, (8)5G, and (9) Cybersecurity. REFERENCES E-SOURCES: How ict affect our daily life. (2019, March 6). AilynVilla. https://ailynvlla.home.blog/2019/03/04/how-ict-affect-our-daily-life/ Duggal, N. (2018, August 8). Top 9 new technology trends for 2021. Simplilearn.com. https://www.simplilearn.com/top-technology-trends-and-jobs-article Duggal, N. (2020, April 22). What is artificial intelligence: Types, history, and future. Simplilearn.com. https://www.simplilearn.com/tutorials/artificial-intelligence-tutorial/what-is- artificial-intelligence ICT in everyday life- Form 4. (n.d.). Information and Communication Technologies. https://cikgushelly.blogspot.com/2012/01/ict-in-everyday-life-form-4.html 13 Chapter 2 – The Web and the Internet MODULE OVERVIEW In this chapter, we will discuss the evolution of the Internet along with many ways to connect to the Internet, how data travels the Internet, and how the Internet works with domain names and IP Addresses. It also introduces services available on the Internet, such as email, video conferencing, telenet, file transferring, world wide web, ecommerce, newsgroup, and internet relay chat. Finally, understand the ethical issues and how you protect yourself while using the Internet. MODULE LEARNING OBJECTIVES At the end of this, students are expected to: Explore the current breakthrough technologies and disruptive innovations that have appeared over the past few years. Identify the different services offered through the web. Appreciate the evolution of world wide web. Understand the risk of putting your information over the internet. LEARNING CONTENTS (Introduction to Internet) The internet is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals. Each of the networks on the Internet provides resources that add to the abundance of goods, services, and information accessible via the Internet. The Internet has its roots in a networking project started by the Pentagon’s Advanced Research Projects Agency (ARPA), an agency of the U.S> Department of Defense. ARPA’s goal was to build a network that (a) allowed scientists at different physical locations to share information and work together on military and scientific projects and (b) could function even if part of the network were disabled or destroyed by a disaster such as a nuclear attack. That network, called ARPANET, became functional in September 1969, linking scientific and academic researchers across the United States. The Internet consists of many local, regional, national, and international networks. Both public and private organization own networks on the Internet. These networks, along with phone companies, cable and satellite companies, and the government, all contribute toward the internal structure of the Internet. The popular term for the Internet is the “information highway”. Rather than moving through geographical space, it moves your ideas and information through cyberspace – the space of electronic movement of ideas and information. Connecting to the Internet Users can connect their computers and mobile devices to the Internet through wired or 14 wireless technology and then access its services free or for a fee. With wired connections, a computer or device physically attaches via a cable or wire to a communication device such as a modem, that transmits data and other items over a transmission media to the Internet. For wireless connections, many mobile computers and devices include the necessary built-in technology so that they can transmit data and other items wirelessly. A wireless modem uses a wireless communication technology (such as satellite or WIFI) to connect to the Internet. Figure 1 below shows example of modem that connects to a computer and enables added functions when attached. Figure 1. Using modem/s to connect computers and mobile devices to the Internet (Source: Cengage Learning) Today, users often connect to the Internet via broadband Internet service because of its fast data transfer speeds and its always-on connection. Through broadband Internet service, users can download webpages quickly, play online games, communicate in real time with others, and more. Many public locations, such as shopping malls, coffee shops, restaurants, schools, airports, hotels, and city parks have WI-FI hot spots. Hot Spot is a wireless network that provides Internet connections to mobile computers and devices. Although most hot spots enable unrestricted or open access, some require that users agree to terms of service, obtain a password or perform some other action to connect the Internet. Internet Service Providers (ISP) An Internet Service Provider (ISP), often known as an Internet access provider, is a company that provides free or paid Internet connection to consumers and companies. ISPs (Internet Service Providers) often charge a flat fee for an Internet connection, with consumers able to choose from a range of plans based on desired speeds, capacity, and services. Bandwidth is a measure of a network's capacity to send and receive data. During the same period, a high bandwidth connection sends more data than a low bandwidth connection. Data sizes are commonly expressed in megabytes and gigabytes. 15 Megabyte (MB) is equal to approximately one million characters. Gigabyte (GB) is equal to approximately one billion characters. Mobile Service Providers A mobile service provider, also known as a wireless data provider, is an Internet service provider that provides wireless Internet access to computers and mobile devices that have the necessary built-in wireless capability, wireless modems, or other communications devices that enable wireless connectivity. To communicate with a mobile service provider, an antenna attached to or integrated into a computer or device, wireless modem, or communications device commonly delivers signals over the airways. Connected computers and gadgets use servers and clients, as well as different wired and wireless transmission mediums, to send data around the world. Your computer or device is a client on the Internet, which may access data and services on several servers. Phone lines are examples of wired transmission medium. IP Addresses and Domain Names IP address, which stands for Internet Protocol address, is a series of digits that uniquely identify the location of every computer or device connected to the Internet or any other network. A domain name is a text-based name that correlates to a server's IP address, such as a web server that hosts a website. It is part of the web address that you put into the address bar of your browser to access a website. The top-level domain (TLD) is the suffix of the domain name that specifies the kind of organization linked with the domain. The table below includes several prominent TLDs. TLD Intended Purpose.biz Businesses.com Commercial organization, businesses, and companies.edu Educational institutions.gov Government agencies.mil Military organizations.net Network providers or commercial companies.org Nonprofit organizations.pro Licensed professionals The organization that approves and controls TLDs is the Public Technical Identifiers (PTI). This nonprofit organization is an affiliate of ICANN which stands for Internet Corporation for Assigned Names and Numbers. The domain name system (DNS) is the method that the Internet uses to store domain 16 names and their corresponding IP addresses. LEARNING CONTENTS (Services offered through the Internet) Some of the services provided by the internet are as follows. 1. Electronic Mail (E-mail). Electronic mail is an electronic message that is transferred from one computer to another computer through the internet. Here are some of the advantages of e-mail: a. It is the cheapest and fastest mail service. b. you can send any form of data like text, image, video, etc. c. physical presence or recipient is not needed. d. It can be read anywhere in the world 2. Telenet. Telenet is an Internet service that allows a computer in another area to access a computer in another location. A remote computer may be accessed from another place via Telenet. 3. File Transferring. The Internet allows for the downloading and uploading of massive amounts of data. To upload or download files from a distant computer, we require an FTP Client application. 4. Video Conferencing. Video conferencing is an innovative Internet service that allows individuals in various locations to converse by observing one other. 5. World Wide Web (WWW). This site has millions of pages of information on a variety of topics. There are millions of information-provider websites on the internet. The Internet Address or Uniform Resource Locator identifies each website (URL). 6. E-commerce. It is an Internet service that allows us to sell or purchase items. We may get it using specialized websites. Electronic commerce sites are those that allow users to purchase and sell items on their websites. 7. Electronic Fax (E-Fax). It is a service that allows users to send and receive faxes from one computer to another. A computer with a modem, an e-fax application, and access to the internet is required to utilize the electronic fax service. 8. Newsgroup. A newsgroup is one of the services given by the Internet that allows users to publish notes or messages on a variety of topics. 9. Internet Relay Chat. It is also one of the most popular Internet services, allowing users in different regions to exchange and receive instant messages. We may use Internet Relay Chat to transmit voice or text messages. LEARNING CONTENTS (Evolution of the World Wide Web) 17 Although the Internet was developed in the late 1960s, the World Wide Web (WWW) appeared in the early 1990s as an easier way to access online information using a web browser. The World Wide Web (WWW) is a system of interconnected hypertext documents accessed through the internet. To access text, images, videos, and other multimedia tools online, one must have an internet connection. Tim Berners-Lee and Robert Cailliau proposed the use of hypertext to integrate information into the web as nodes; through a browser, users can view the hypertext. In this way, World Wide Web was designed as the first web service. Web 1.0: The Read-Only Web/ The Hypertext Web Web 1.0 is the first generation of WWW and lasted between 1989 and 2005. Berners-Lee coined the term Web 1.0, and stated it as the read-only web. Through read-only, internet users were only reading information presented to them. It is less dynamic and less interactive in comparison to what we currently have. The primary aim of websites at this time was to make information public for anyone and set up an online presence; web was mainly focused on content delivery rather than interaction and production. Web 2.0: The Read-Write Web/ The Social Web Web 2.0, or the read-write web, is more people-centric and participative compared to its precursor. Unlike 1.0 version, Web 2.0 allows more control to users and provides interaction. At this point, the web has introduced a business revolution in the computer industry; businesses have moved into the web platform to introduce their services to more people. Interaction in Web 2.0 is bidirectional; businesses publish content, as do people. That is why Web 2.0 is also distinctly called as the Social Web. Blogs and other social profiles became popular at this time. Web 3.0: Executable Web/ The Semantic Web Web 3.0 is known as the semantic web; it includes integration, automation, data, and discovery. It encourages mobility and globalization. Through Web 3.0, users are allowed to find, share, and collaborate among each other. The semantic web allows a person or a computer to start off in one database, and then move through an unending set of databases. From Berners-Lee, “if HTML (Hypertext Markup Language) and the Web made all the online documents look like one huge book, RDF, schema, and inference languages will make all the data in the world look like on huge database”. Web 4.0 Web 4.0 is founded on the use of wireless communications. Computers and mobile devices are utilized to connect people and objects anytime and anywhere. An example of Web 4.0 technology is the GPS (Global Positioning System). Web 5.0 Currently, Web 5.0 is still progressing. This is defined as linked, emotive, and symbolic web that promotes human-computer interaction. To add, Web 5.0 is centered on emotional connections with humans. It acts similarly to a personal assistant. Technology and human contact have grown inextricably linked. In this approach, they will pave the path for a more customized experience, which will attract an increasing number of individuals. LEARNING CONTENTS (Ethical Issue – A Glimpse of Privacy) 18 Computer ethics are defined as a “set of moral principles that govern an individual or a group on what is acceptable behavior while using a computer.” It governs the usage of computers and the sharing of information over the internet. Some of the common issues of computer ethics is the violation of copyright issues, accessing personal information of other people, confidentiality and privacy issues, among other issues. These common issues are defined below. Computer Ethics Issues 1. Ethics and Responsible Decision-Making. An IT student/practitioner/professional should be made aware of their individual responsibility in making ethical decisions associated with information security. 2. Confidentiality & Privacy. Computers can be used to frighten, deceive, or swindle victims metaphorically. Attorneys, government entities, and companies are increasingly using piles of computer-generated data to confuse their audiences legally. The computer has made invasions of our privacy much easier and perhaps more hazardous than they were before the computer. Individuals' data is gathered and kept in a variety of digital files. The illegal commercial use of electronic data, breaches of confidentiality through revealing sensitive data to other parties, and the leaking of records to governmental authorities for investigation purposes are all possible risks to privacy. 3. Piracy. This is the act of illegally reproducing or disseminating copyrighted material, such as computer programs, books, music, and films, and other media. 4. Fraud & Misuse. The introduction of fake records into a computer system, theft of money by electronic methods, theft of financial instruments, theft of services, and theft of valuable data are all examples of computer-related fraud. 5. Liability. An explicit warranty includes promises and affirmations made by the software creator to the user concerning the nature and quality of the application. Express warranties can be defined by programmers or merchants. As a result, businesses must be realistic when making claims and forecasts about the capabilities, quality, and nature of their software or hardware. They should think about the legal implications of their affirmative promises, product demonstrations, and product descriptions. Every word they say might be as legally binding as if it were written down. As a result, all agreements should be in writing to avoid responsibility. A disclaimer of explicit guarantees can protect a provider from liability for any informal, hypothetical remarks or forecasts made during the transaction. 19 6. Patent and Copyright Law. A patent can safeguard an idea's unique and confidential qualities. In comparison to copyright, obtaining a patent is extremely difficult. Complete disclosure is necessary in the case of computer software; the patent holder must publish all the specifics of a program for a skilled programmer to develop the program. Copyright law is an extremely powerful legal instrument for safeguarding computer software, both before and after a security incident. This sort of breach might involve the theft of data, computer programs, documents, or other comparable materials. As a result, the information security professional should be conversant with the fundamentals of copyright law. 7. Trade Secrets. A trade secret safeguards something valuable and beneficial. This legislation safeguards the unique and private elements of ideas that are known only to the discoverer and his/her confidants. Once revealed, the trade secret is no longer a secret and can only be protected by one of the following laws. The use of trade secret legislation is especially crucial in the computer industry, where even a little head start in the creation of software or hardware can give a major competitive advantage. 8. Sabotage. The computer can be the object of attack in computer crimes such as the unauthorized use of computer facilities, alternation or destruction of information, data file sabotage, and vandalism against a computer system. Computers have been shot, stabbed, short-circuited, and bombed, which affects their performance, Protecting Yourself While Using the Internet 1. Educating Children/Teens. For parents and or older siblings, talk to and teach your children/younger siblings about the perils of the internet and the threats of cyber predators. Tell them not to meet people they met online in person and not to chat to people they do not know. Discuss the significance of not sharing identifying information, sensitive information, images, or details about forthcoming events on the internet. Make sure kids realize that what they see on the internet may not be accurate. Teach children that anything they put online is public unless they properly regulate the privacy settings. Spend time on the internet with your kid, learn about their favorite online sites, know their passwords, restrict the amount of time they spend online, and consider putting the computer in a public area of the house. Examine your child's PC and emails on a regular basis. Know who your kids/siblings are chatting with online. 2. Emails, Phishing, and Malware. When opening emails from unfamiliar individuals or sources, especially when they are unsolicited, use caution. By clicking on links or downloading attachments, you risk infecting your computer with a virus or being a victim of fraud, malware, or a scam. Some viruses can destroy your computer, while others can steal your personal information and, eventually, your identity. When you get emails that appear to be from your bank or another financial institution, be suspicious, especially if they require you to verify or submit personal or financial information. Be 20 wary of scams that employ email links to take you to a website or provide you with a phone number to call. Some email links might be deceptive. Consider entering your own link to the banks and corporations, or search for them. In general, be wary of email scammers and websites that aim to deceive you into disclosing personal information. A legitimate-looking website may be created fast. Remember that professional customer care employees will never request personal information or passwords from you. Consider not replying to unwanted emails, never click on links in these emails, and use caution if a speedy response is asked. Consider buying or downloading an excellent antivirus package that includes spyware protection. 3. Parental Controls. To limit internet access to safe websites, parents should consider using parental controls through their internet service provider and/or blocking software on family computers and smartphones. If you have any questions, please contact your internet service provider. Research your options when it comes to parental controls on different items. 4. Passwords. Make secure passwords with at least 10 (ten) characters and a mix of upper-case letters, lower-case letters, symbols, and digits. Personal information should not be included. When dealing with sensitive information, consider changing your password at least every 90 days (approximately 3 months). Passwords should never be left near your computer or in plain sight. Use multiple passwords for different online activity since if one is compromised, all are vulnerable. Never give out your password. If you are offered the option of setting up a password "hint" on an account, do not use something that others may simply guess. 5. Personal Information. Think twice before posting anything online or sending information in an email. Anyone can see what you publish online. Sharing personal information with someone you don't know is one of the most dangerous things you can do online. Sharing sensitive information like your address, phone number, family members' names, car information, passwords, work history, credit status, social security numbers, birth date, school names, passport information, driver's license numbers, insurance policy numbers, loan numbers, credit/ debit card numbers, PIN numbers, and bank account information is dangerous and should be avoided. Consider deleting your name from websites that disclose your personal information gathered from public records with everyone on the internet (including your phone number, address, social media avatars, and images). 6. Photos. Photos taken with cellphones include GPS coordinates, which allow people to decide the position of the photograph and may be used to locate you. When uploading images to online social networking sites, keep this in mind. Remember that photographs you upload online can be copied, edited, and shared with many people without your knowledge or agreement, unless you use privacy settings to limit who can see them. 21 7. Public Computers. Avoid typing sensitive information on public computers, such as those in a public library or an internet café. Spyware may be installed on these computers that record your every keystroke. Also, you never know who may be watching your activity. Never select the feature that automatically signs you on to email or check any box to “Remember my Password” on websites. 8. Selling. Beware of selling and listing items in local ads or elsewhere online. Never meet someone alone. If necessary, consider meeting in a public place, like a post office or bank rather than a parking lot. Beware of posting photos taken from smartphones for online adds. You could be sharing your home address with a criminal. 9. Shopping. Avoid purchasing products and services from websites that do not have a secure check-out using “HTTPS (Hypertext Transfer Protocol Secure).” Pay attention to checkout page’s address line; the checkout page asks you to enter your credit card information. If the checkout page does not have an “S” after “HTTP”, consider shopping elsewhere. Be warned that certain information transferred on HTTP pages is in plain text, which computer hackers may intercept. 10. Social. Be wary about meeting somebody in person who you met on the internet or over email. Not everyone is truthful about their identity, age, gender, or objectives. Do your investigation using public documents if required, and consider finding reliable recommendations. If you decide to meet someone, never travel alone, notify others of your plans, meet in a public spot, and have your mobile phone nearby. 11. Updates. Keep your computer’s operating system, browsers, antivirus, and other software up to date with the latest or daily security patches. 12. Webcams. Be careful when using webcams. These devices can be high-jacked and turned on remotely. This allows others to illegally view and listen to individuals without their knowledge. Consider turning them off or disconnecting them when not in use. Limit or do not allow your children to use webcams and talk to them about the risks. 13. Wireless. Beware when connecting your laptops or mobile devices to any unsecured networks. Computer hackers on the same network can intercept your internet use; in some cases, they can also access files on your computer. To add, consider password protecting your home wireless network and using a personal firewall program for added protection. LEARNING ACTIVITY 2 Answer the questions below. c. Who owns the Internet? d. How to use public WI-FI hotspot safely? e. How to register a domain name? 22 Watch the videos (link) 1. History of the World Wide Web - https://youtu.be/WlryJFlyr10 2. Uses of the Internet - https://youtu.be/sawN1GVgDmE 3. Tim Berners Lee: https://youtu.be/OM6XIICm_qo SUMMARY Module 2 presented the current breakthrough technologies and disruptive innovations that have appeared over the past few years and discussed the different services offered through the web. It presented the evolution of world wide web from web 1.0 to web 5.0. Finally, this module listed the different ethical issues and some tips on how to protect yourself while using the Internet. REFERENCES E-SOURCES: Chapter-5: Internet and Web-II. (2021, July 1). INFORMATICS PRACTICES. https://studywidpranay.wordpress.com/chapter-10-introduction-to- internet-and-web/ EthicalIissues. (n.d.). Home. https://www.niatec.iri.isu.edu/ViewPage.aspx?id=153 Internet ethics - Student - ISEA. (n.d.). ISEA. https://www.infosecawareness.in/concept/student/internet-ethics Services on the internet | Notes, videos, QA and tests | Grade 10>Computer Science>Internet and its services | Kullabs. (n.d.). KULLABS - An Award Winning E- Learning Platform Initiating Free Education. https://kullabs.com/class-10/computer- science/internet-and-its-services/services-on-the-internet 23 Chapter 3 – Digital Technology and Social Change MODULE OVERVIEW IT is an essential building block of the society. Presently, it has become the driving force behind social development. The module will hopefully provide a deeper understanding on how technological and social revolution go together. This module will contain discussions on digital technology and its role in social change. MODULE LEARNING OUTCOMES At the end of this module, students are expected to: a. Explain the role of ICT in social change. b. Understand the strengths, weaknesses, opportunities, and imminent threats of the digital age. c. Articulate basic, but fundamental definitions of complex issues and dynamics that humans encounter every day, such as technology, social progress, development, and digitalization. LEARNING CONTENT (INTRODUCTION TO THE DIGITAL AGE) The Digital Age is simply the time wherein enormous amounts of information are made available to many people through digital computers. Initially, the underlying technology used in the digital age was invented in the later quarter of the 19th century. ▪ Origins of the Digital Age (1947-1969) Transistors and integrated chips were created between the 1940s and the late 1960s. Moore's Law predicts the pace of rise in performance and size of integrated circuit chips, predicting that the number of transistors in an IC would double every two years. Based on this finding, it is projected that the manufacturing of integrated circuits for electronic devices would increase year after year. Moore's Law has been utilized as a roadmap for semiconductor and electronics businesses' digital breakthroughs. These electronic devices led the way to more advanced digital computers. ▪ Invention of the Internet and the Introduction of Personal Computers (1969-1989) Packet-switched networks were developed in the late 1960s to the early 1970s. This has brought the development of the Internet; wherein multiple networks are joined to make a network of networks. The 1970s is also the time in which home computers were introduced. Home computers are more affordable than the computers used in business and in the academe (scientific- and engineering-oriented computers). This implies that even if a 24 buyer lacks technological understanding, they may obtain inexpensive computers. Computer specialists anticipated at the time that digital technology has stealthily crept into our lives and households. In this era, semi-ubiquity has made their way into homes, schools, and businesses. Automated teller machines and industrial robots were used in banking & finance and in fabrication companies; video games and electronic music became popular with the youth; mobile phones and digital cameras were used for communication and event- recording. ▪ Invention of the World Wide Web (1989-2005) Tim-Berners Lee developed the World Wide Web in 1989. It became open to the public in 1991. The internet swiftly grew in popularity, and by 1999, every country had an internet connection. In the 2000s, an increasing number of people owned cell phones. Text messaging became a cultural phenomenon at this time. ▪ Social Media and Web 2.0 (2005-present) In 2005, the population of the Internet reached 1 billion; in 2020 67% of the world’s population is connected to the internet. Cloud computing has also entered the mainstream, with hundreds of companies investing on cloud platform. With the advent of smartphones come social media. LEARNING CONTENT (THE ICT AND ITS ROLE IN SOCIAL CHANGE) Since the products of ICT is all around us, it is intuitive that information technology influences our society. An information society has ICT as the main driver of rapid information growth. Through this information growth, there are subsequent social changes. Social informatics focuses on teaching the social issues of computing. Theories in technology and social change include the following: ▪ Social Construction of Technology (SCOT). Advocates of SCOT theory believe that technology does not determine human action, rather, human action shapes technology. ▪ Social Shaping of Technology (SST). Technology is not neutral, according to this view, and is shaped by society's dominating social, political, and economic values. As a result, shifts in values result in various technological outputs, and social science concerns can be utilized to shape technologies. To add, according to Peter-Paul Verbeek, a professor of technological philosophy at the University of Twente in the Netherlands, technology already has an impact on our moral decision-making, which impacts human agency, privacy, and autonomy. He warns against 25 considering technology solely as a tool for humans, instead advocating for it to be viewed as an active agent. Social Media and Its Role in Social Change Since the early 2000s, the usage of social media has grown dramatically. Social networking sites such as Facebook and Twitter, among others, were created in this time. Given the global diversity of these social media sites, it is difficult to generalize about their purpose, although they are focused on facilitating social interaction networking, such as linking friends. Nonetheless, the use of social media for societal change and political activity has the potential to be essential since these networks are built around key social communities and relationships that may be used to affect society. Filipinos are declared as the most active users based on multiple web-based social media sites, and the Philippines has been dubbed as the “Social Media Capital of the World.” Social networking in the Philippines has extensive uses, including: (a) information dissemination; (b) promotion of e-commerce platforms; (c) as a form of electoral campaign, (d) as tools to aid criminal investigation, and more. LEARNING CONTENT (GLOBAL DIGITAL DEVELOPMENT) Research, development, and deployment of digital technologies are important in sustainable development. Information and communication technologies (ICTs) are beneficial in the development of the society; its importance is highlighted during the COVID-19 crisis wherein ICTs are instrumental in keeping healthcare and economy afloat. ▪ ICT Infrastructure for Digital Development The International Telecommunication Union (ITU) facilitates the improvement of telecommunication infrastructure in the developing world. During the ongoing pandemic, there is increased dependency on digital infrastructure and reliable internet access. As countries impose social distancing measures, it is important to have reliable internet access to go about our normal lives. ITU calls for the improvement of the digital services provided by telecommunications operators ▪ MSMEs and ICTs Micro, small, and medium enterprises (MSMEs) make use of digital technology in adapting with the difficulties brought by the COVID-19 pandemic. Small businesses use social media sites to market their products; business owners also deal with e- commerce, which is the facilitations of transactions through online means. MSMEs are given a platform through digital technology. ICT can impact the growth of MSMEs in our society. ▪ Connecting Health Services for Public Welfare Through digital technology, we can connect health centers and hospitals to their patients. This enables health services such as telemedicine and remote diagnostics. LEARNING CONTENT (TECHNOLOGICAL CHANGE) 26 Technological change (TC) refers to the total process of creating, innovating, and disseminating technologies or processes. technical advancement is based on the improvement and expansion of technology. Technological change includes the following: 1. Invention of Technologies Finding new or breakthrough technology (including products and processes) is included in product development. When modern technologies are invented, they are patented. Utility patents are done for new processes, machinery, articles of manufacture, and others. 2. Commercialization or open-source release through research and development (producing emerging technologies) Transitioning technologies from the research lab to the marketplace is called technology commercialization. Getting a patent or licensing an invention takes it into the market to create financial value. R&D agreements between science institutions and the industry provides research institutes with funding. Meanwhile, open-source release allows a copyright holder to grant users the right to use, study, change and distribute their product. This occurs in open-source software. Open-source software development allows the collaboration of online users in the development of the software. Through open-source code, end users can change and adapt their software to their personal needs; this is done since the modular software allows for the development of independent components. One of the prominent organizations that is involved in open-source software development is the Linux Foundation, which has spawned popular Linux distributions such as Debian, Ubuntu, and Fedora. Commercialization and open-source release are both examples of technology transfer. 3. Continuous technological improvement (often resulting in lower costs) Through technological innovation, previous versions of a product are used as motivation to create new or better products. Research and development take on the role of developing new services and improving existing ones. Patents and other scientific advancements are fueled by R&D, which leads to productive growth in industries including manufacturing, medicine, engineering, and government. 4. Technology dissemination throughout industry or society Technology dissemination or diffusion is the spread of technology in the industry, and in the society. As an example, computers were used in business settings such as office workstations; then, personal computers have made its way into our homes. Normally, the dissemination of technology involves disruption and convergence: these are periods of success and stagnancy in the adoption of technology. LEARNING CONTENT (SOCIAL EVOLUTION) Information Technology has the potential to promote social empowerment and social 27 transformation. IT has profoundly altered our information and communication paradigms by allowing multiple ways for communication and information flows that are easy and affordable. Another major paradigmatic characteristic of IT is the ability for asynchronous communication (i.e., emails in which both sender and receiver need not be connected at the same time) and even synchronous communication (through video conferencing, 5G communication, etc.). Furthermore, digital information processing may assist in different work and professions that were previously deemed unimaginable. Here are some indicators on how ICT has empowered communities. Indicators for Community Empowerment (through ICT use) - Social Capabilities strengthened **adopted from Gigler, Bjorn-Soren Dimension Objective Outcome indicator Informational To improve access to information system strengthened information and informational information flow within community capabilities improved horizontal and vertical knowledge exchanges with other communities Organizational To strengthen organizational transparent selection of leaders capabilities increased efficiency improved information flow and coordination among different organizations Social To improve access to basic improved access to formal and non- Development social services formal education (i.e., e-learning) improved knowledge and access to health services improved knowledge and access to social programs of the government (e- government services) Economic To promote economic improved access to markets and Development opportunities commercialization of products improve productive activities through enhanced knowledge (i.e., better knowledge about agricultural practices) enhanced capacity to mobilize resources from outside donors Political To improve participation in the improved ‘voice’ and participation in Participation political system development process To enhance transparency within improved transparency of political community community institutions (e-government) enhanced information-based decision- 28 making through easier information processing better coordination of political activities in the community direct participation in government activities Cultural Identity To strengthen the communities’ mainstreamed appreciation of culture cultural identity and tradition improved dissemination of communities’ own culture LEARNING ACTIVITY 3 Answer the following questions: 1. Based on the discussions, how doe SCOT and SST differ? 2. List down the social media sites you use. What do you use it for? How does it affect your lives daily? 3. Technological change is done in multiple stages. Explain how computers have evolved through the stages of technological change. SUMMARY Through information technology, enormous amounts of information are made available to many people through digital computers. Information technology influences our society. Two theories try to explain how IT and social change intertwine: the Social Construct of Technology and the Social Shaping of Technology. Social media has grown dramatically since the 2000s. Social networking sites make it easier to promote social and political campaigns, disseminate information, and other purposes; thus, it has a function in shaping social activity of its users and other individuals. Research and development (R&D) are made easier through information technology. This allows the advancement of IT infrastructure, business, and commerce, as well as healthcare systems all over the world. Technological change is the process of creating new inventions, marketing and innovation, and the dissemination of modern technology. IT can influence social transformation. REFERENCES BOOKS/E-BOOKS: E-SOURCES: Gigler, Bjorn-Soren. (2004). Including the Excluded-Can ICTs empower poor 29 communities? Towards an alternative evaluation framework based on the capability approach. Gleick, James (2011). The Information: A History, a Theory, a Flood Greenfield, P. (2019, August 8). Communication technologies and social transformation: Their impact on human development. DOI:10.1017/9781108264846.009 Gutman, Dan (September 1987). "What happened to the computer revolution?". Commodore Magazine. Miladi, N. (2016, February). Social media and social change. https://www.researchgate.net/publication/294579134_Social_Media_and_Social_Cha nge PH remains top in social media, internet usage worldwide – report. (2021, January 28). Rappler. https://www.rappler.com/technology/internet-culture/hootsuite-we-are-social-2021- philippines-top-social-media-internet-usage The role of social media in societal change: Cases in Finland of fifth estate activity on Facebook - Nina Sormanen, William H. Dutton, 2015. (2015, November 5). SAGE Journals. https://journals.sagepub.com/doi/full/10.1177/2056305115612782 30 Chapter 4 - Overview of Ethics MODULE OVERVIEW This module will discuss the overview of ethics by defining ethics, identifying values and attitude anchored to ethics, the different ethical principles, and its application, as well as the different forms of ethical theories. MODULE LEARNING OBJECTIVES At the end of this, students are expected to: 1. Define ethics, values, and attitude 2. Discuss the different ethical principles 3. Differentiate the forms of ethical theories LEARNING CONTENTS (Ethics, Values, and Attitude) What is Ethics? The set of standards of right and wrong that govern human behavior, it involves recommending concepts of what humans ought to do. It can also refer to as a set of accepted beliefs of individual or group of people based on morals that control human behavior. Ethics can be seen in the form of codes of conduct implemented personally or by organizations. Ethics has something to do with human behavior and it have direct impact on human values and attitude. Values can contribute to determine appropriate standard behavior, and attitude is manifested in persons behavior. Values It can simply define as something that is worthy or important to an individual. Person’s belief affects evaluative judgments about what is right or desirable. How personal character will develop, people think and behave determined by things that a person regard as good or right. Some examples of values are respect, honesty, personal responsibility, or kindness. Attitude It refers to person’s strong belief or feeling towards people, things, and situation. Attitude can be positive or negative and it can influence the behavior of those around them. Example of positive and negative attitudes are confident, cooperative, considerate, cheerful, unfriendly, selfish, snobby and the like. LEARNING CONTENTS (Ethical Principles) Ethical Principles It is the basis of ethical analysis and serves as the viewpoints in making decisions. These are the ethical recommendations and evaluations of human actions in justifying judgments. It 31 determines the considerations that should be weighed in decision making or judgment. The different ethical principles are beneficence, least harm, respect for autonomy, and Justice. Beneficence It refers to an act of charity, mercy, and kindness with a strong connotation of doing good to others including moral obligation. A person’s duty to act in the best interests and well-being of the patient, client, or resident. This action can be in a form of kindness, mercy, and/or charity with implication of doing good to others and moral obligation. However, doing more than is required or beyond what is obligatory is called exceptional beneficence or classified as supererogatory. For example, providing an extra benefit to clients that exceeds to the required services. Least Harm (Non-maleficence) A person’s duty to do no harm, to protect others from harm, and to maintain one´s professional competence. It is like beneficence except that it can be applied to situations in which neither choice is beneficial where a person should choose to do the least harm possible and to do harm to the fewest people. A person has a larger responsibility to simply walk past other person rather than to make derogatory remarks about that person. Respect for Autonomy A person’s duty to respect and promote individuals´ decision for themselves or apply to their lives in achieving what they believe to be in their best interests that includes respect for privacy and confidentiality. For example, a patient can choose or decide about their medical treatment. Justice (Distributive Justice) All persons involved, being of equal moral worth, should be treated fairly. Ethical decisions should be consistent with the ethical theory except there is a situation that provide an excuse and justification for an action. For example, A police officer is allowed for over speeding to arrive in the crime scene immediately and to prevent a person from getting hurt. LEARNING CONTENTS (Forms of Ethical Theories) Ethical Theories Ethical theories are based on ethical principles that points up different aspects of an ethical conflict and serves as guide to ethically correct resolution that is not beyond the ethical theory guidelines. The choice of a person in ethical theory commonly based on their experiences. There are four categories of ethical theory that includes deontology, utilitarianism, rights, and virtue. Deontology A category of ethical theory stating that people should adhere to their obligations and duties when performing decision making in an ethical conflict. Upholding one’s duty is considered ethically correct where a person follows his/her obligations to another individual or group of people. A deontologist produces consistent decisions since they will be based on individual’s set of duties. 32 The flaw of this theory is that there is no rationale or logical basis for deciding an individual’s duties. The reasons why people chose to make it as their duty is unknown. Another flaw is the conflict on duties and concern with the welfare of others, for example a person’s duty is to attend a meeting on time and the situation of this person is running late, how this person supposed to drive? Speeding breaks his/her duty in the society and on the other hand he/she will arrive at the meeting late that will not fulfill his/her duty. Utilitarianism It is founded on one’s ability to predict the consequences of an action. For utilitarian, the ethically correct choice is the option that yields the greatest benefit to the most people. It compares predicted solutions and determine the choice which is more beneficial for more people. Two Types of Utilitarianism: 1. Act Utilitarianism – conforms to the definition of utilitarianism, which sticks to actions that benefit the greatest number of people regardless of personal sentiments or society restraints such as laws. 2. Rule Utilitarianism – actions are concerned with fairness and takes law into account. It seeks to benefit the most people however through the fairest and most just means available. It values justice as well as beneficence at the same time. Act and rule utilitarian have disadvantages although life experience can be applied in predicting outcomes, it is not certain that these predictions are accurate. This flaw can lead to unexpected results and the decision maker appear unethical. Another issue of utilitarian decision makers is the ability to assess different sorts of outcomes on a similar scale. It is also difficult to compare tangible gains to intangible gains (such as money and happiness) since their attributes differ so drastically. Achieving the maximum good is the concern of act utilitarian. Consequently, one individual’s right may break the terms to benefit a greater number of people. This type of utilitarianism is not always concerned with autonomy, beneficence, and/or justice for an individual if persecuting leads to a solution that benefits majority of people. Another challenge for act utilitarianism occurs when an individual faces sudden changes in experiences in the set of variable conditions that can lead to changes in the decision. The possibility of conflicting rules occurs in rule utilitarianism. It may encounter conflicting ideas about what is ethically correct that leads to no ethically correct answer. For example, the scenario of running late in the meeting. An individual may believe that following the law would benefit society and at same time he/she may also believes that arriving on time in the meeting is ethically correct since it also benefits the society. Rights The ethical theory that based on rights are the rights that established by a society and are given the highest priority and protected. When the rights were endorsed by a large population, it is considered valid and ethically correct. Rights can also be grant to others if they have the 33 ability and resources. On a larger scale, this theory has major complication. Understanding the characteristic of a right in the society is a must and the society must determine what rights it wants to sustain and give to its citizens. To be able to do that, they must decide what is the ethical priorities are and the society’s goals. Hence, to make the rights theory useful, it must be used concurrently with another ethical theory that explain the goals of the society constantly. For example, upholding the right to freedom of religion was one of the goals of a society, and this right was upheld in the Constitution then people have the right to choose their religion. Virtue The virtue ethical theory judges the character of a person rather than an action that may veer from the person’s normal behavior. When rating an unusual behavior that considered unethical, they must consider the person’s reputation, morals, and motivation. For example, if a person plagiarized a part of a paper that was subsequently discovered by a peer, the peer will grasp the person's character and will criticize the person accordingly. If the plagiarizer typically respects the rules and is well-liked by his peers, the peer who comes across the plagiarize paper may be able to assess his friend more leniently. Perhaps the researcher had a late night and just forgot to properly cite his or her source. A person with a reputation for academic misconduct, on the other hand, is more likely to be evaluated harshly for plagiarizing due to a persistent history of unethical activity. The change in a person's moral character is not taken into account, which is a drawback of this form of ethical theory. LEARNING ACTIVITY 4 1. What is the impact of ethics in a person’s values and attitude? 2. Give example or scenario that may apply in each ethical principle. 3. Differentiate the forms of ethical theory. SUMMARY Ethics is a set of standards of what is right and wrong used to govern human behavior; it entails advocating conceptions of what individuals should do. It is related to human conduct and has a direct influence on human values and attitudes. Values is something that is worthy or important to an individual. Attitude refers to person’s strong belief or feeling towards people, things, and situation. Ethical principles are ethical suggestions and assessments of human acts used to explain judgements. Beneficence, least damage, autonomy, and justice are the many ethical principles. Ethical theories are founded on ethical principles that highlight various elements of an ethical problem and serve as a guide to morally right resolution that does not go beyond the ethical theory parameters. Deontology, utilitarianism, rights, and virtue are the four categories of ethical philosophy. 34 REFERENCES E-SOURCES: Personal values and ethics – Organizational behavior. (2019, February 27). BCcampus Open Publishing – Open Textbooks Adapted and Created by BC Faculty. https://opentextbc.ca/organizationalbehavioropenstax/chapter/personal-values- and-ethics Principles and theories. (n.d.). Biology at Davidson. https://bio.davidson.edu/people/kabernd/indep/carainbow/Theories.htmEthicalTheories. pdf (dsef.org) The principle of beneficence in applied ethics (Stanford encyclopedia of philosophy). (n.d.). https://plato.stanford.edu/entries/principle-beneficence/ What is ethical principles - Meaning and definition - Pallipedia. (n.d.). Pallipedia - The Free Online Palliative Care Dictionary. https://pallipedia.org/ethical-principles/ 35 Chapter 5 - Ethical Issues in Digital Age MODULE OVERVIEW As data become available over the internet, ethical issues arise as well. Digital age makes our data vulnerable to different types of ethical issues. This module will discuss the privacy, privacy invasion, hacking, theft, copyright infringement, freedom of expression and online defamation, piracy, fraud, and Internet pornography. At the end of this, students are expected to: 4. Identify the different ethical issues in digital age. 5. Describe the threats posed by hackers, fraud, piracy, and internet pornography 6. Identity the different types of theft 7. Discuss the copyright infringement 8. Discuss the freedom of expression and online defamation LEARNING CONTENTS (Ethical Issues in Digital Age) 1. Privacy According to law, privacy is the right of every individual to make personal decisions and conduct their life in a reasonable manner away from public observation. In other terms, it is an individual's or a group's capacity to choose express themselves and keep themselves or information about themselves private. Privacy Invasion It is a legal term that describes a circumstance or condition in which a person intrudes on the privacy of others, such as the abuse or disclosure of sensitive information and unlawful monitoring. Invasion of privacy is an unlawful conduct that carries legal ramifications since it causes loss or hurt to people's life. Types of Privacy Invasion a) Intrusion into seclusion – It refers to the purposeful intrusion of another person's private affairs. It also involves the act of looking for private information of a confidential nature, even if the information is not publicly available. In this sort of tort, the legal criterion should be deliberate and extremely offensive to a reasonable person. b) Appropriation of name or likeness – it refers to the act of using the name and likeness of other person publicly without authorization for his/her own benefit such as trading and advertising purposes. c) Public disclosure of private facts – it refers to the publication of other person’s private affairs with the state that it is highly offensive to a reasonable person and in legitimate public concern. d) Placing a person in a false light – act of stating information that is based on opinion and may be technically true, but indicates to a reasonable person that anything bad 36 and/or incorrect about the target is true. It is similar to defamation, except that no false statements are required. 2. Hacking System penetration is the act of getting unauthorized access to data via a system or other digital device such as a computer. Because information in digital form is subject to numerous forms of assaults, it is one of the most prevalent dangers in cybersecurity. There are various labels for different types of hacking, which include the following: a) Black-hat hacker – it refers to an act that takes advantage of security vulnerabilities to gain unlawful access to private networks for the purpose of private advantage. b) White-hat hacker – it is a type of hacker that works for the common good by hacking networks to call attention to flaws in security to be fixed. c) Gray-hat hacker – It refers to the person who enact activities of both black hat and white hat hacker. d) Script Kiddie – a novice in hacking. To hack networks, it follows instructions and use pre-existing software. There are also different tools and methods used in hacking: a) Key-logging software – it is remotely installed on a computer to record keystrokes and commands. These recordings will be collected over the Internet and played back to spy and steal username and password. b) Packet-sniffing software – it is used to steal private data that is being transported over a network. It focuses on capturing and analyzing packets that flows over the network or Internet. It might capture important information such as passwords and credit card numbers. c) Port-scanning software – it is used to search random IP addresses for open ports to be hacked. d) Social Engineering – it refers to the exploitation of natural human tendency to trust others. For example, pretending to be an administrator through phone call to make the person to provide a password or other important information. e) Dumpster diving – a method of going through trash of other user to steal personal information such as credit card numbers. 3. Theft Another ethical issue concerning the use of computer is theft. The most popular type of theft is known as identity theft – an act of stealing other’s personal information to commit fraud. It can also be in the form of pretending to be someone else, using the information of other people for money and other benefits. An identity thief can make unauthorized purchases and transactions using other person’s credit card information. Personal information can be obtained using computer technology by accessing computer- based public records, hard drives of discarded and stolen computers, hacking computer networks using information-gathering software/malware, or by simply sending deceptive text messages or emails, and browsing social networking sites. 4. Copyright Infringement 37 The act of using the copyrighted works or covered by copyright law without permission. Specifically, reproducing, distributing, displaying, performing protected work, or making derivative works without authorization of the copyright holder. A copyright holder can be a creator of the work, publisher, or other business that copyright was assigned where they invoke legal and technological measures to prevent and penalize copyright infringement. Copyright infringement in the Philippines constitutes the following statement: “Under Philippine law, copyright infringement occurs when there is a violation of any of the exclusive economic or moral rights granted to the copyright owner. It may also consist in aiding or abetting such infringement. The IP Code also provides for the liability of a person who at the time when copyright subsists in a work has in his possession an article which he knows, or ought to know, to be an infringing copy of the work for the following purposes: (a) selling or letting for hire, or by way of trade offering or exposing for sale or hire, the article; (b) distributing the article for the purpose of trade, or for any other purpose to an extent that will prejudice the rights of the copyright owner in the work; or (c) trade exhibit of the article in public.”. Different forms of copyright infringement: Film recording in a movie theater Posting a video on your company’s website that features copyrighted contents such as songs, wordings, and images Modifying copyrighted image or videos and displaying it to company’s website Creating merchandise for sale that features copyrighted works Downloading films or music without paying their use Copying any artistic or literary work without license 5. Freedom of Expression and Online Defamation Freedom of expression is the right to search, receive, and impart information of your choice regardless of boundary without interference. It is the right of every person to express themselves even online and to access information, opinions, and expressions of others including views on religion, political speech, opinions, and expressions that are inoffensive, but also expressions and opinions that might be offensive and disturbing to others. Having the right to express yourself should consider the rights of others and right to privacy. Online Defamation is the act of giving false statement that is harmful to someone’s reputation verbally or in written form using online platforms such as social media platform. There are two types of defamation: a) Libel – it refers to the written defamatory statement b) Slander – it refers to the spoken defamatory statement For example, if the defamatory statement is posted online such as comment in a Facebook post, it is considered as libel and identified as online defamation. Other example includes public comments on media websites such as online newspapers or magazine, chatrooms, 38 and blog posting comments. Is freedom of expression can be a defamation? Statements that are labeled as merely opinions does not make it as defamation. Courts focuses on statement of verifiable facts which means the statement conveys probable false factual assertion such as cheating on his/her spouse, or someone committed murder. 6. Piracy Privacy entails the unauthorized reproduction, use, and distribution of digital intellectual property such as software, music, and movies. Piracy and plagiarism are types of violations of intellectual property laws, such as copyright offenses. Pirated software, music, and films can be obtained via file sharing networks or handmade CDs and DVDs. Examples of Piracy includes the following: Illegal use or interception of internet connection of other people Publication, reproduction, and/or use of patented or copyrighted work without permission Unauthorized copying of protected software Using protected software without license 7. Fraud In general, it is a wrongful act and criminal deception resulting in financial or personal gain. Computer fraud is the term used in executing the illegal act using computer system or attacking a computer intends to alter, damage, or worst disable it. Types of fraud includes: a) Mail Fraud – fraudulent activity that uses mails or emails such as sending a letter to someone to scam money or gain personal information. It also includes using chain letters to collect items or money, or by simply stealing and opening someone else’s mail. b) Health Care Fraud – it refers to a situation where an individual such as insurance provider or medical office misuse the insurance information for their own personal gain. c) Debit and Credit Card Fraud – accessing other people’s debit or credit cards that can completely drain bank accounts. d) Internet Fraud – fraudulent activity using internet to take advantage to other people. It includes data breaches, malware, and phishing. 8. Internet Pornography Accessing pictures or films that contains representation of sexual behavior using Internet. It is accessible over the Internet via file sharing and websites. The increasing availability of public access via the World Wide Web fuels the proliferation of internet pornography. Pornography is illegal for children, yet it has grown so accessible and widely available that it is seen as one of the most serious hazards to children's internet safety. Internet pornography is regard as illegal when there are minor children involved. Online 39 child pornography has become a major issue, and it can take the form of pictures, movies, drawings, animations, and even computer-generated imagery. In certain circumstances, child pornography involves an adult being portrayed as a kid. Child pornography can also entail the alteration of a picture to make it appear like a child. Internet pornography includes uploading and downloading pornographic materials via internet illegally, this is also regard as internet pornography crime. LEARNING ACTIVITY 5 4. Describe the positive and negative impacts of technology on freedom of expression. 5. Watch the following video: https://www.youtube.com/watch?v=PYhNWpXWLLc. Based on the video clip, what are the laws implemented for health records? How do these laws protect our health records? 6. How can you protect your personal information against identity theft? SUMMARY Privacy invasion is a legal phrase that describes a circumstance or condition in which a person intrudes on the privacy of another, such as the abuse or disclosure of personal information or unlawful monitoring. Hacking is the act of getting illegal access to data through the use of a system or other digital equipment, such as a computer, and is also known as system penetration. Theft is an act of stealing other’s personal information to commit fraud. Copyright infringement is the act of using the copyrighted works or covered by copyright law without permission. Freedom of expression is the right to search, receive, and impart information of your choice regardless of boundary without interference. Online Defamation is the act of giving false statement that is harmful to someone’s reputation verbally or in written form using online platforms such as social media platform. Piracy involves illegal copying, use, and distribution of digital intellectual property such as software, music, and movies. Fraud is a wrongful act and criminal deception resulting in financial or personal gain. Internet pornography refers to accessing pictures or films that contains representation of sexual behavior using Internet. REFERENCES BOOKS/E-BOOKS: Stair R., Baldauf K. The World of Information Technology. 2009. Cengage Learning. E-SOURCES: 40 Copyright law in the Philippines | Federis. (n.d.). Federis & Associates Law. https://www.federislaw.com.ph/faqs-resources/copyright/ Freedom of expression and information. (n.d.). Freedom of Expression. https://www.coe.int/en/web/freedom-expression/freedom-of-expression-and- information How to avoid copyright infringement. (2015, December 2). LegalZoom: Start a Business, Protect Your Family: LLC, Incorporate, Wills, Trademark, Legal Advice. https://www.legalzoom.com/articles/how-to-avoid-copyright-infringement Internet pornography crimes. (n.d.). Jackson Personal Injury Law Firm | Coxwell & Associates. https://www.coxwelllaw.com/internet-pornography-crimes.html Privacy legal definition of privacy (thefreedictionary.com). https://legal- dictionary.thefreedictionary.com/privacy The torts of invasion of privacy. (n.d.). Lawshelf Educational Media. https://lawshelf.com/shortvideoscontentview/the-torts-of-invasion-of-privacy/ 41 Chapter 6 - Privacy MODULE OVERVIEW Privacy can be described as imposing constraints on access to and/or use of personal information. Privacy refers to the usage of information collected about individuals and stored in databases. This

Use Quizgecko on...
Browser
Browser