STS Notes for 2nd Quarter Lesson 1: The Information Age PDF
Document Details
Uploaded by Deleted User
PINEDA
Tags
Summary
These notes detail the information age. They cover various topics such as social media, its impact, and inventions related to communication. The note provides a brief description of aspects of history, like postal services and the telegraph, and then moves to a discussion of social media.
Full Transcript
STS Notes for 2nd Quarter 1997 - radio (1891) – Six Degrees (first social media site) Lesson 1: The Information Age Social...
STS Notes for 2nd Quarter 1997 - radio (1891) – Six Degrees (first social media site) Lesson 1: The Information Age Social Media Now Information – any sort of knowledge that contribute Examples: MySpace, LinkedIn, Twitter, Facebook, Technology – easy access on information Pinterest, Tumblr, and Grindr Information Age The Impact of Social Media to Society - truly a new age based upon the interrelationship Socialization of computers via telecommunications. with these information structures operating on both real time Pros: and as needed basis. furthermore, the primary ✓ facilitates connection across long distances, factors driving this new age forward are helping people stay in touch with friends and convenience and user-friendliness, which, in turn, family will create user dependence – James Robert ✓ allows for meeting new people with shared Messenger (father of the information age) interests, fostering diverse friendships Social Media Before 1900 Cons: - the first legitimate postal service is believed to ▪ can lead to superficial relationships, impacting have originated in ancient Persia around 550 the quality of deep, meaningful connections BCE. the Persian King Cyrus the Great is credited ▪ may contribute to feelings of loneliness or with establishing the system, which was used to inadequacy due to comparison with others send and receive administrative communications - New York University professor Samuel Morse Business began working on his version of the telegraph in 1832; he developed morse code (a set of sounds Pros: that corresponded to particular letters of the alphabet), in 1835; and by 1838 he had presented ✓ provides a platform for cost-effective advertising his concept to the U.S Congress and customer engagement, especially for small - pneumatic post or pneumatic mail is a system to businesses deliver letters through pressurized air tubes. it ✓ enables real-time feedback, which can improve was invented by the Scottish engineer William products and customer satisfaction Murdoch in the 19th (1865 est.) century and was Cons: later developed by the London Pneumatic Despatch Company ▪ risks include negative reviews or viral backlash, which can harm a brand’s reputation Two of the most important inventions (socmed before 1900): Politics Alexander Graham Bell (1890) telephone – long Pros: distance communication in real time Guglielmo Marconi (1891) radio – it is a belief ✓ allows for wider dissemination of political Nicola Tesla invented Radio but because of information and encourages civic engagement technicality Marconi invented ✓ gives a voice to marginalized groups, helping to raise awareness of various issues Social Media in the 20th Century Cons: 1960 – CompuServe 1970s – primitive sorts of email were developed, ▪ can facilitate the spread of misinformation and UseNet polarize public opinion 1980s – Home Computers, Internet Relay Chat ▪ often amplifies extreme viewpoints, leading to (IRC) increased political division PINEDA Job Hiring a law within the Philippines, and approved on September 12, 2012. it aims to deal with legal Pros: issues concerning online interactions and, therefore the Philippines’ internet. among the ✓ enables recruiters to reach a larger, more diverse cybercrime offenses or punishable acts included talent pool the ff: ✓ social profiles offer insights into a candidate’s personality and interests Punishable Acts under the Cybercrime Law Cons: Offenses against the integrity, confidentiality, and availability of computer data and systems: ▪ may lead to bias, as recruiters might make judgments based on personal profiles 1. Illegal Access – the access to the entire or any ▪ candidates’ social media posts can lead to a part of a computing system with no permission privacy concerns or unintentional 2. Illegal Interception – the interception created by disqualifications technical ways without right or any non-public transmission of computer data to, from, or within Education a computing system including electromagnetic Pros: emissions from a computing system carrying such computer data ✓ offers access to a wealth of educational 3. Data Interference – the intentional or resources and online communities for learning irresponsible alteration, damaging, deletion or ✓ facilitates collaboration among students and deterioration or computer network, electronic teachers, even outside school hours document, or electronic data message, with no permission, including virus introduction or Cons: transmittal 4. System Interference – the intentional ▪ can be distracting, affecting students’ modification or irresponsible hindering or concentration and productivity interference with the operating of a computer or ▪ risk of spreading inaccurate information, as not all computer network by damaging, inputting, shared content is verified or reliable transmitting, deleting, altering deteriorating, or The Cybercrime Law suppressing computer program or data, electronic data message or electronic document, - in 1996 the Council of Europe and side without the right or authority, including the government representatives from the US, introduction or transmission of viruses Canada, and Japan, drafted an initial treaty 5. Misuse of Devices – the use, production, sale, covering computer crime. around the globe, civil procurement, importation, distribution, or libertarian groups immediately protested otherwise making available, without right, of: (a) provisions within the treaty requiring internet a device, including a computer program, service providers (ISPs) to store data on their designed primarily to commit any of the offenses customers’ transactions and show this under this act; or (b) a computer password, information over demand. work on the treaty access code, or similar data by which the whole proceeded nevertheless, and on November 23, day or any part of a computer system is capable 2001, the Council of Europe Convention on of being accessed with the intent that it be used Cybercrime was assigned by 30 states. the for the purpose of committing any of the offenses convention came into effect in 2004. additional under this act protocols, covering terrorist activities and racist 6. Cybersquatting – the obtaining of a domain and xenophobic cybercrimes, were proposed in name over the internet in bad faith to profit, 2002 and came into effect in 2006. additionally, mislead, destroy the reputation, and deprive various national laws, like the USA PATRIOT Act others of registering the same, if such a domain of 2001, have expanded law enforcement’s name is: power to watch and protect computer networks (a) similar, identical, or confusingly similar to an - the Cybercrime Prevention Act of 2012 was existing trademark registered with the appropriate officially documented as Republic Act No. 10175, PINEDA government agency at the time of the domain and services are prohibited unless: (a) there’s name registration: prior confirmative consent from the recipient; or (b) identical or in any way similar with the name (b) the first intent of the communication is for of a person other than the registrant, in case of a service and administrative announcements from personal name; and the sender to its existing users, subscribers or (c) acquired without right or with intellectual customers; or (c) the ff conditions are present: property interests in it (1) the commercial transmission contains an easy, valid, and reliable way for the recipient to Computer-related Offenses: reject. receipt of further commercial electronic messages (opt-out) from an equivalent source; 1. Computer-related Forgery – the input, (2) the commercial transmission doesn’t alteration, or deletion of any computer data purposely disguise the origin of the electronic without right leading to inauthentic data with the news; and intent that it’s considered or acted upon for legal (3) the commercial communication doesn’t aim as if it were authentic, despite everything intentionally include misleading information in any whether or not the information is directly readable part of the message to induce the recipients to and intelligible; or, the Act of knowingly using read the statement computer data and that the product of computer- 4. Libel – the unlawful or prohibited acts of libel as related forgery as defined herein, for the aim of defined in Article 355 of the Revised Penal Code, perpetuating a fraudulent or deceitful design or as amended, committed through a computer plan system, or any other similar means which can 2. Computer-related fraud – the unapproved input, devise within the future alteration, or deletion of computer data or program or interference within the functioning of Lesson 2: Climate Change a computing system, causing injury thereby with fraudulent intent: provided that if no damage has Climate Change yet been caused, the punishment imposable shall be one degree under - the significant, long-term changes in global or 3. Computer-related Identity Theft – the willful regional climate patterns, primarily caused by acquisition, use, misuse, transfer, possession, human activities alteration or deletion of identifying information Greenhouse Gases belonging to somebody, whether natural or juridical without right: provided, that if no injury Carbon Dioxide – burning of fossil fuels–such as has yet been caused, the punishment imposable coal, oil, and natural gas–for electricity, heat, and shall be one degree under transportation Methane – from agriculture, waste, and energy Content-related Offenses: production. livestock such as cattle, sheep, and 1. Cybersex – the intentional engagement, goats produce methane during digestion, a maintenance, control, or operation, directly or process known as enteric fermentation indirectly, of any lascivious exhibition of sexual Nitrous Oxide – agriculture is the leading source organs or sexual deed, with the help of a of nitrous oxide emissions, primarily due to the computer system, for consideration or favor use of synthetic fertilizers, which release N2O as 2. Child Pornography – the prohibited or unlawful they break down in the soil acts defined and punishable by the Anti-Child Evidences of Climate Change Pornography Act of 2009 or Republic Act No. 9775, committed through a computer system: 1. Rising Global Temperatures provided, that the penalty to be imposed shall be (1) one degree beyond that provided for in Republic Act No. 9775 3. Unsolicited Commercial Communications – the transmission of economic transmission with the utilization of a computer system which seeks to advertise, sell or offer purchasable products PINEDA 2. Melting Polar Ice and Glaciers 3. Extreme Weather Events What Can We Do 1. Transition to Renewable Energy 2. Improve Energy Efficiency 3. Support Sustainable Agriculture and Diets 4. Protect and Restore Ecosystems 5. Advocate for Climate Policies Lesson 3: Food Security Food Security and Insecurity Food Security - is the condition in which all people at all times have access to sufficient, safe, and nutritious food that meets their dietary needs and preferences for an active and healthy life 4. Ocean Warming and Acidification Food Insecurity - occurs when people lack regular access to enough safe and nutritious food for normal growth, development, and an active, healthy life PINEDA Nutritional Value: the nutritional value dispensed by the foods that are consumed, as measured in calories, vitamins, protein, and various micronutrients such as vitamin A, Iron, Iodine Health Status: the cause and effect of diseases such as diarrhea, AIDS, HIV, on the ability to ingest food and absorb and metabolize its nutritive value Food Safety: access to food free from wasted food or from toxic contamination during the production, processing, packaging, and Components of Food Security distribution of food; and from food–borne diseases such as salmonella and norovirus 1. Food availability Preparation and Consumption: resources such - enough health-giving food of sufficient value as cooking materials and fuel, knowledge, and needs to be available to people for their ability to make ready and consume food in a utilization. availability can be simulated through: healthy and hygienic method Production: how much and what variety of food is available that is manufactured and preserved 4. Stability locally or domestically - food may be available and accessible to Distribution: how is food made accessible, what, individuals who can utilize it successfully and to whom, and when avoid increases in malnutrition. for individuals not Exchange: how many of the available food can to feel insecure, this situation needs to be be acquired through exchange procedures such practical rather than temporary or subject to as barter, trade, purchase, or credit fluctuations 2. Food Access Reasons Why Food Security is Important - individuals and families must obtain sufficient food to eat, a healthy, nutritious diet or access 1. Everyone must eat – our reliance on food is so enough resources need to grow their food like central that we often do not contemplate it or who land. access can be affected because of: is benefiting and buying 2. Food is a fundamental human right – in human Affordability: the ability of individuals, rights, article 25 includes the “right to a normal households, or society to afford the price of food or land for manufacturing food, relative to their way of living sufficient for the health security of earnings himself and of his household, including medical Allocation: the phase of economic, social, and care, food, housing, and clothing.” human rights political methods governing when, where, and leaders worldwide are anxious about the actions how consumers can acquire food. for example, of global institutions like the World Trade food may be unequally distributed according to Organization that contravene these and other age and gender within the family citizens’ liberty Preference: social religious, and societal norms 3. Food is the basis of a community’s wealth – and values control consumer demand for definite food is a necessary element of community self- types of food like religious prohibitions or the sufficiency. it provides jobs, supports public desire to follow a specific dietary pattern such as health, enhances culture, and enables vegetarianism community. because of its essential nature, food and agriculture keep going when other industries 3. Food Utilization go wrong. there are many linked jobs in food - people must have access to a sufficient amount preparation, processing, and distribution for every and diversity of foods to meet their nutritional farmer needs and eat and metabolize such food. 4. Our food system is unduly dependent on utilization can be affected by the ff: distant suppliers – most of us rely on a structure that rarely has further than 3-4 days fresh food gathered locally–food that travels a long way. PINEDA Excessing transportation is dominated by Hunger, Malnutrition and Poverty economies of scale that do not account for environmental worth or freshness loss. this Hunger practice is susceptible to interruptions of diverse - usually assumed as an uncomfortable or painful types and is inadequate risk supervision sensation caused by low food energy utilization 5. What we see in the supermarket is an - weakened condition brought about by prolonged unprotected quality – the bounty on the lack of food or a specific nutrient supermarket shelves gives the impression that our food systems are in good condition. Malnutrition perfection–in variety and looks–comes with a price, but all the risks and most of the long-term - situation that results from devouring a diet in environmental and social costs are concealed. for which one or more nutrients are one or the other instance, you can buy vegetables and fruits all not enough or are too much such that the diet year round, which must be imported outside our causes health problems. malnutrition may be an flourishing season. these products are grown far effect of food insecurity or it may be related to away, under regulations over which we have no non-food factors such as: control, by people who may be sacrificing their 1. Inadequacies care practices for children food security to grow cash crops for our 2. Insufficient health services supermarkets 3. Unhealthy environment 6. We can only handle what is close to home – food products are grown, prepared, processed, Poverty and packaged/assembled and can only be - not having enough material ownership or income effectively supervised in our control, where for a person’s needs. it may include political, people have some say about the process economic, and social elements. complete poverty 7. Eventually, a community, province, or nation is the total lack of the means necessary to meet is indebted to its food suppliers – the use of basic personal needs, such as food, clothing, and food as an armament is becoming more common shelter around the globe. it is folly to free our capability of feeding ourselves 8. It is vital to conserve the blueprint (skills, tools, and capacity to feed ourselves) – we are losing people who could teach us the arts of preserving, growing, harvesting, and cooking our food, and most of us are losing expertise 9. People are rightly concerned about food- health relations – consumers are increasingly anxious about the security of their food. these can be related to manufactured food products and questions about disease, pesticide, residues, hormones, or genetically modified organisms, and links between diet and additives (such as cancer or Mad Cow Disease) 10. Decent food is the basis of health About one out of ten Filipinos are food insecure. almost all of the food insecure Types of Food Insecurity households are at moderate levels of food insecurity. only at 0.35 percent of households are ✓ Chronic Food Insecurity at a severe level of food insecurity ✓ Transitory Food Insecurity The poorest regions are generally the most ✓ Seasonal Food Insecurity food insecure. only three regions – BARMM, VIII, and XII – have food insecurity levels above 20 percent, and these are among the seven poorest in the Philippines. regions V and IX are PINEDA the only regions with high poverty incidence that Six out of ten households are relying on food- have a relatively low level of food insecurity based coping strategies. the most common The proportion of food insecure in BARMM is strategy households adopt is substituting for significantly higher compared to all other lower quality food, with almost six out of ten regions. BARMM, the poorest region in the households reporting this. however, there is also Philippines, is the only region with more than a a significant proportion of households, saying that third of households categorized as food insecure. they are reducing their consumption of food food insecurity in BARMM is 17 times that of the overall with four out of ten households reporting region III, which is the least food insecure. the that they have reduced the size of their meals high level of food insecurity is BARMM is especially concerning considering that interviews were conducted before Tropical Storm Nalgae hit the region. considering this, we expect food insecurity in the second round to increase significantly Lesson 4: Biotechnology What is Biotechnology a multidisciplinary field that involves that the use The majority of the population are adopting coping of biological systems, organisms, or derivatives to strategies develop or create useful products and technologies. it combines biology with Seven out of ten households are adopting technology, leveraging cellular and biomolecular livelihood coping strategies to address their processes to address challenges in various food needs. households, on average, use about sectors, such as medicine, agriculture, industry, two coping strategies. the most common coping and the environment strategies adopted are not severe (e.g. 57 percent borrowed money for food) Biotechnology can be categorized into several types Almost four out of ten households report based on its application areas, often identified by using more severe coping strategies. the most color codes, such as: common among these are spending savings and reducing spending on health/education Red Biotechnology – medical applications essentials. in three regions (VII, IX, and BARMM), Green Biotechnology – agricultural the majority of households report having to resort advancements to crisis and emergency coping strategies. White Biotechnology – industrial processes similarly, about half of agricultural households Blue Biotechnology – marine and aquatic say they use these types of coping strategies, applications while this figure was only 38 percent among non- agricultural households PINEDA Applications of Biotechnology like the Asiatic corn borer. it has significantly increased yields and reduced pesticide use 1. Medical Applications Golden Rice – a biofortified rice variety enriched Drug Development – pag produce ng mga with vitamin A to combat malnutrition, particularly gamot na ina-allow ng batas in children. it was granted biosafety approval in Gene Therapy – parang programmer, even the 2021 and is being prepared for commercial dna, may tinatanggal or pinapalitan or modify distribution kung may kulang sa atin Diagnostics Biofertilizers and Biopesticides – development of Tissue Engineering – 3D printing microbial-based products like Mykovam (a biofertilizer for Personalized Medicine – chemotherapy enhance plant growth) and pest control solutions using beneficial microorganisms 2. Agricultural Applications Plant Breeding and Genomics – utilization of molecular Genetically Modified Organisms (GMOs) markers and genomic tools to develop stress-tolerant rice Biopesticides and Biofertilizers – micro- and other crops organisms substances Cloning – dolly the sheep 1996 2. Medical Biotechnology Animal Biotechnology – design to grow faster Vaccine Research and Production – the Research 3. Industrial Applications Institute for Tropical Medicine (RITM) and other health Biofuels – renewable energy agencies are working on vaccine development, including Bioplastics dengue and COVID-19 vaccines, in collaboration with Enzymes in Industry international partners Waste Management Diagnostics – Filipino scientists have developed rapid diagnostic kits for diseases like dengue, chikungunya, 4. Environmental Application and leptospirosis, improving disease detection and Bioremediation control Bio-monitoring – using nature to monitor areas Sustainable Practices Biopharmaceuticals – local production of affordable biosimilars and other medicines to address the growing Emerging Technologies in Biotechnology demand for healthcare o CRISPR-Cas9 – gene editing technology for 3. Environmental Biotechnology precise genetic modifications | you could eradicate invasive species Bioremediation Projects – efforts to clean polluted water o Synthetic Biology – designing and constructing bodies and rehabilitate ecosystems using microbial and new biological | artificial yeast plant-based technologies o Omics Technologies – genomics (study of genes), proteomics, and metabolomics for Waste Management Solutions – development of deeper insights into biological systems bioplastics and technologies for converting organic waste o Artificial Intelligence in Biotech – accelerating into bioenergy and compost drug discovery and improving predictive models Climate-Resilient Solutions – biotechnological Advancements of Biotechnology in the Philippines innovations to mitigate the impacts of climate change, such as salt-tolerant crops for coastal farming 1. Agricultural Biotechnology 4. Marine Biotechnology Genetically Modified (GM) Crops – the Philippines is a leader in Southeast Asia for GM crop adoption. notable Seaweed and Algal Research – seaweed is a key export advancements include: product of the Philippines. researchers are working on improving seaweed strains for higher yield and disease Bt Corn – the first GM crop approved in the resistance. seaweed-derived bioplastics and biofuels are Philippines (2002), providing resistance to pests also being explored PINEDA Marine-Derived Products – studies on marine organisms for potential applications in pharmaceuticals, cosmetics, and nutraceuticals Biological Weapons 5. Government and Institutional Support - uses of biological agents like bacteria, viruses, or toxins to cause disease or death in humans, Philippine National Biotech Program (PNBP) – animals, or crops spearheaded by the Department of Agriculture (DA), this program focuses on promoting biotechnology applications Example of Biological Weapons in agriculture and food security Example 1: Anthrax Biosafety Regulations – the Philippines has a robust Agent: Bacillus anthracis, a spore-forming biosafety framework, including the Joint Department bacterium Circular (JDC), which governs the development and use Delivery: spores can be aerosolized, spread via of GMOs mail, or mixed into food or water supplies Effects: Biotechnology Research Centers – institutions like the inhalation anthrax causes severe International Rice Research Institute (IRRI) in Los Baños respiratory distress and is often fatal if and the Philippines Rice Research Institute (PhilRice) are untreated global leaders in rice biotechnology cutaneous anthrax affects the skin, creating ulcers and lessons 6. Public Awareness and Education - efforts to promote understanding of Historical Use: biotechnology among Filipinos through campaigns, forums, and education programs in 2001, anthrax spores were sent have improved public acceptance of biotech through the U.S. portal system, killing 5 products, especially GM crops people and infecting 17 others during World War II, Japanese forces Lesson 5: Weapons of Mass Destruction used anthrax bombs on Chinese populations Weapons of Mass Destruction (WMD) - class of weaponry capable of causing significant Example 2: Smallpox harm on a large scale, whether through mass Agent: Variola virus, eradicated in the 1980s as casualties, widespread destruction of natural disease infrastructure, or lasting environmental damage Delivery: aerosolized particles or direct contact with infected materials Nuclear Weapons Effects: causes high fever, body aches, and a - use nuclear reactions (fission or fusion) to release distinct rash leading to pustules massive amounts of energy, resulting in extreme extremely contagious with a high destruction, radiation, and long-term mortality rate environmental damage - fission – splitting of a large atomic nucleus in Historical Use: smaller particles - fusion – combination of light atomic nuclei to allegedly used by British forces in North form a heavier nucleus America, who distributed smallpox- - both fusion and fission release vast amounts of infected blankets to Native Americans energy, but they do it in different ways Example 3: Botulinum Toxin Example of Nuclear Weapons Agent: neurotoxin produced by Clostridium botulinum bacteria Atomic Bomb – Hiroshima and Nagasaki; Delivery: contaminated food, water, or fission-based aerosolized particles Hydrogen Bomb – Marshall Islands; fusion- based PINEDA Effects: Example 3: VX Nerve Agent causes paralysis by blocking Agent: a highly toxic organophosphate neurotransmitters, potentially leading to compound respiratory failure and death Delivery: aerosol, sprays, or contact with lethal even in minuscule doses contaminated surfaces Effects: Historical Concern: even small amounts can be fatal, causing death by respiratory failure investigated as a potential weapon by highly persistent in the environment, multiple nations during the 20th century making cleanup challenging Chemical Weapons Historical Use: - use toxic chemicals to harm or kill. they act rapidly assassination of Kim Jong-Nam, half- and can cause mass casualties depending on the brother of North Korean leader Kim Jong- agent and delivery method Un, in 2017 at a Malaysian airport Example of Chemical Weapons Radiological Weapons Example 1: Sarin Gas - also known as “dirty bombs”, use conventional Agent: a nerve agent classified as an explosives to disperse radioactive materials. they organophosphate cause contamination rather than immediate Delivery: aerosols, bombs, or artillery shells destruction Effects: disrupts the nervous system, causing Example of Radiological Weapons convulsions, paralysis, and asphyxiation death can occur within minutes of Example 1: Cesium-137 Dirty Bomb exposure Material: Cesium-137, commonly found in medical or industrial equipment Historical Use: Delivery: a conventional explosive (e.g., TNT) disperses the radioactive material over a wide in 1995, the Aum Shinrikyo cult released area sarin gas in the Tokyo subway, killing 13 Effects: people and injuring over 1,000 immediate blast injuries from the used in the Syrian Civil War in multiple explosion alleged attacks long-term radiation exposure increases cancer risks and environmental Example 2: Mustard Gas contamination Agent: Sulfur mustard, a blistering agent psychological impact due to fear of Delivery: bombs, shells, or sprayed as an radiation aerosol Effects: Concerns: causes severe chemical burns on the skin and lungs, leading to blisters and feared as a terrorist weapon; there have respiratory damage been no confirmed uses, but thefts of long-term effects include cancer and radioactive sources like cesium-137 are permanent lung damage documented Historical Use: Example 2: Cobalt-60 Material: Cobalt-60, used in radiotherapy extensively used during World War I, machines causing widespread injury and death Delivery: explosives or deliberate placement in persisted in use during conflicts in the high-traffic areas 20th century, including the Iran-Iraq War (1980-1988) PINEDA Effects: releases gamma radiation, causing acute radiation sickness and increased cancer risk highly radioactive and poses a long-term contamination risk Historical Concerns: never used in attacks, but highly regulated due to its potential for weaponization Example 3: Polonium-210 Material: Polonium-210, a radioactive isotope Delivery: ingestion or injection Effects: causes acute radiation poisoning, leading to organ failure and death symptoms may not appear immediately, making detection difficult Historical Use: used in the 2006 assassination of Alexander Litvinenko, a former Russian spy PINEDA