Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

IT grade 12 Unit 2

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 30

Grade 12

IT
UNIT 1
INFORMATION SYSTEMS
AND THEIR
APPLICATIONS
1.1. Ethical, Legal, Social,
Environmental and Health Issues in
the Use of Information Systems
 The use of new technologies including
information systems, has a significant impact
on human behavior and our daily activities
including how we live, work, and learn.
 Increased consequences have been emerging
which needs all user’s awareness about the use
of information systems.
 The knowledge and skills about raising issues
and proper use of information systems help
students to become responsible members of
society who can navigate a knowledge based
and technology-led economy.
1.1.1 Ethical and Legal Issues in
Information System
 Ethics is all about the principles of making right or
wrong decisions.
 According to Britannica dictionary, ethics defined
as, the discipline concerned with what is morally
good and bad and morally right and wrong.
 Ethical principles needs to be respected and if not
might result in legal consequences for those
cases who are against the applied laws.
 Many professionals including medical and
education professionals, government officials, and
business people have legal and ethical oversight
to control how their professions function.
some ethical and legal issues
1. Privacy:
information privacy relates to personal data
stored on the computer system
Most people have their data spread throughout
the digital systems, and private information
should be accessed using personal passwords.
However, personal accounts such as email, social
media, and private bank accounts, can be
accessed by unauthorized sources which create
both ethical and legal concerns.
 It is morally wrong and unethical to view an
individual’s private information in anyways which
may also end up being a legal issue.
2. Digital Ownership:
 It is ability to access and/or use and protect data,
information, and knowledge about ourselves or
things we own.
 The expansion of digital mediums has allowed
information to flow more freely than before which
makes content easily copied and pasted online.
 This makes digital ownership hard to control in the
digital world.
 It is unethical to use somebody else’s digital works
without getting permission from the owner first
since it ignores the right of the creator. Creators
has right to allow or deny the use of the contents.
3. Information Gathering:
 Many information system applications collect users’ data and
credentials as part of their operations.
 Such information gathering trends can lead to many ethical and
legal issues depending on the purpose and level of information
gathering approaches.
 The measure has opened a debate about what and why
information can be gathered.
 This issue raises a question of consent which protect individuals
against attempts to steal information.
 Users need to understand and examine the intention of any
information-gathering request by any service providers or third-
party applications while they use the services. Such requests
need special attention if those organizations, systems, or
applications request personal information and credentials.
 This protects against any illegal and fraudulent information
stealing attempts.
4. Information Security and
Liability:
 Growing amounts of personal and financial information are
being transferred and stored online as organizations and
businesses depend more and more on electronic data and
computer networks to carry out their daily operations.
 If and when a breach in information security happens, this
might expose organizations and businesses to potential
security liability. Such attempts might lead to identity theft,
which happens when the personal details of innocent
people to be harvested by a third party so that they can be
used for malicious purposes.
 Accepted procedures and rules are needed to provide
conditions to increase the reliability of information systems.
Users also need to report any security breach incidents that
happened on their systems and tools to the concerned
department/unit or expert in their organizations or the
concerned government body promptly
1.1.2 Social Issues in Information
System
 The expansion of accessible information system
technologies has led to several significant changes in how
society functions.
 With personal computers and the Internet offering
unrestricted access to all of the knowledge ever created
and discovered by humans, the majority of these changes
have improvements to society.
 Those social advantages including access to technology
which fills the digital divide gaps within the global citizens,
use of advanced technologies like Artificial Intelligence and
Augmented Reality in public which changes how peoples
act and react , and widespread use of digital platforms ,
social medias and computer games for business and
entertainment activities
 However, some negative social issues to consider while
using technological services and Internet-based
applications
some negative social issues
1. Socializations Gaps
 Socializing within a family unit has always been important,
as it strengthens the bonds among family members or
friends and ensures cohesion within the group.
 However, with more and more households owning several
computers and numerous portable devices granting access
to information and entertainment.
 some argue that this is leading to a lack of family
socialization and natural interactions in the present moment
 It is also become common to see friends who are out in a
cafe and still staring at a touch screen rather than talking to
one another. Increase your digital well-being by allowing
technology to improve your life and not become a
distraction from your life and others.
2. Cyber Bullying-
 It is a practice of sending, posting, or
disseminating unfavorable, hurtful, or malicious
content about someone else online.
 It can also involve disclosing sensitive or private
information about another individual in a way that
causes embarrassment or humiliation.
 Cyber bullying can happen online through social
media, forums, or gaming where users can interact
with, or exchange content with others. It can also
happen through text and other messaging
applications
 Example - The availability of the internet and
computer access can cause problems in terms of
4. Plagiarism
 According to university of oxford, Plagiarism is presenting work or
ideas from another source as your own, with or without consent
of the original author, by incorporating it into your work without
full acknowledgement.
 The act of plagiarism has grown to be a significant issue because
students can easily copy and paste entire passages of material
from Internet resources without giving credit to the author
 This has particularly become a challenge for educational
institutions, now applying different tools and systems to check
the originality of students’ work at all levels.
 Plagiarism in the workplace and in academia can destroy an
author’s credibility and have significant consequences, such as
dismissal from school or job loss.
 Students need to produce original works, use books and Internet
resources as references and sources of insight, and give
appropriate credit to authors when they refer to their works in
any way
5. Cybercrime
 Computers have contributed positively to the development of both
individual actions and large-scale global movements.
 The other side of the coin is organized cybercrime which is use of a
computer as an instrument to further illegal ends, such as committing
fraud, stealing identities, or violating privacy and intellectual property
rights as stated in Britannica dictionary.
 Cybercrime, especially through the Internet, has grown in importance
as the computer has become central to education, commerce,
entertainment, and government.
 According to Official reports from Ethiopian Information Network
Security Agency (INSA) officials Ethiopia is also experiencing different
cyber-attacks which shows increasing trend from time to time that
needs a serious attention and a collaborative effort from all citizens
and professionals.
 This clearly shows that students need to prepare themselves for the
21st-century patriotism mission to protect personal, organizational
and national digital resources by being mindful system users to
protect against crime and terrorism attempts to ensure the country’s
digital sovereignty
3. Social Media and Gaming
-
Addiction
According to addiction center definition social media
and gaming addiction is a behavioral addiction that is
characterized as being overly concerned about social
media and computer games, driven by an
uncontrollable urge to log on to or use social media,
and devoting so much time and effort to social media
that it impairs other important life areas.
- This day’s social media and video gaming are common
ways in which people spend their leisure time.
- Researches on social networking addiction and
Internet gaming disorders finds that intensive online
activity can negatively impact young people’s mental
health.
- Students need to be curious and mindful about their
use of social media and video games to live a safe and
healthy lifeSuch practices have direct links and
impacts on their family relationships, learning
performance, future life goals, and mental health.
6. Job Opportunities and
Challenges
 The current trends in automation and emerging
technologies like artificial intelligent machines, help to
automate routine tasks which lead to improved quality of
service.
 On the other hand, such expansion of automated systems
leads to loss of jobs because some types of jobs like
cashiers, data entry clerks, and factory workers can be
managed by automated systems.
 Automation often creates as many jobs as it destroys over
time.
 The type of skills that people need to acquire is constantly
changing and people with low educational backgrounds are
most at risk since the future job market needs more skilled
professionals.
 We must be mindful of our actions and be responsible for
every step that we take to get benefits out of those
advancements.
1.1.3 Environmental issues caused by
Information Systems
 Using technologies smartly and responsibly is essential in order
not to create problems while utilizing the advantages. Because
electronic devices contain hazardous materials that are unsafe
for the environment.
 Most electronic devices contain non-biodegradable materials,
heavy metals, and toxic materials like cadmium, lead, and
mercury which can leak into the ground, where they can
contaminate the water we drink, the plants we eat, and the
animals that live around the area.
 This clearly shows that is our responsibility to protect the
environment while we use and dispose of any information
system components.
 To this end, advanced electronic waste management techniques
shall be applied to minimize the damage.
 Negative impact of information systems on the environment
have also led to the development of new environmentally
friendly technology solutions aiming to help solve some of the
biggest environmental concerns that we face as a society
through a shift towards a more sustainable, low-carbon economy.
1.1.4 Health Issues caused by
information systems
 Health information systems are essential for the rapid
generation of high-quality data that will be used to
inform all relevant stakeholders for program planning,
review, and monitoring as well as generally ensuring
and enhancing the quality of all components of the
health system.
 The widespread use of information systems and access
to mobile device in healthcare can make it easier to
offer care, improve care delivery, empower patients
through personalized messaging, and collect real-time
data to optimize resources and decision-making.
 However, we must also pay attention to health related
challenges that caused by unmanaged use of
information system services and products on users.
 Some of the challenges include, sleeping disorders and
lack of productivity, loss of attention and stress.
1.2. Intellectual Property
 Intellectual property rights refers to a range of
intangible rights of ownership of an asset such
as a software program or designed information
system.
 Intellectual property rights provides different
methods for protecting these rights of ownership
based on their type.
 As stated by Ethiopian Intellectual Property
Office Establishment Proclamation, Proclamation
No. 320/2003 “Intellectual property” means a
legal right over a creative work of the human
intellect and includes patent, trademark,
registration certificate and copyright”
Four Types Of Intellectual Property
Rights
1. Trade secrets: are Intellectual Property rights on
confidential information which may be sold or
licensed. The unauthorized acquisition, use or
disclosure of such secret information in a manner
contrary to honest commercial practices by others is
regarded as an unfair practice and a violation of the
trade secret protection
2. Patent: is an exclusive right granted for an invention.
Generally speaking, a patent provides the patent
owner with the right to decide how - or whether - the
invention can be used by others. In exchange for this
right, the patent owner makes technical information
about the invention publicly available in the published
patent document’’. When a property owner holds a
patent, others are prevented, under law, from offering
for sale and making or using the product.
Four Types Of Intellectual Property
Rights
3. Copyrights: Copyrights and patents are not the
same although people are often confused. A
copyright is a type of intellectual property
protection that protects original works of
authorship, which might include literary works,
music, art, and more. Copyright protections are
automatic; once you create something, it is yours.
However, if your rights under copyright
protections are infringed, and you wish to file a
lawsuit, then registration of your copyright will be
necessary. Graphical User Interfaces (GUIs) can
also be registered for copyright.
4. Trademarks: is a sign capable of distinguishing
the goods or services of one enterprise from those
of other enterprises”.
1.3. Digital Identity Management
 As stated by onfido.com, “a digital identity is a
collection of information about a person that
exists online”.
 This data can be used to create a digital image of
a person when it is collected. Such information
can be used by businesses to identify their clients.
 A digital identity is all of information about an
individual, organization, or electronic device that
exists online.
 Every individual should have the right to a trusted
and secured digital identity to access fundamental
services, like financial services, mobile
connectivity, health, controlling device using
fingerprint education, and other services.
Cont……………………
 For almost every organization, digital identity
management presents both significant opportunities and
associated risks.
 Management of a digital identity involves limiting the data
that a person gives out, avoiding excessive use of storage,
checking what data is stored about each individual,
making corrections to incorrect personal data, avoiding
redundant data, etc.
 Digital identification can be verified in a variety of ways,
including through database checks, document and identity
verification, biometric verification, and identity
verification.
 A user can access internet services including banking,
health, and travel after proving their identity.
 There is an ongoing effort at a national level to enhance
citizens’ digital identity management practices.
1.4. Collaboration Through Digital
Technologies
 Digital collaboration means working with other individuals or
teams and getting things done using digital devices and
technology.
 It can include different tools, apps, software, procedures and
processes.
 Digital collaboration uses technology to improve workplace
collaboration, communication, document management,
content management, and information flow across the
organization which in turn leads to improved employee
productivity and efficiency.
 Digital collaboration has become important and is relevant to
most organizations, groups, communities, schools and
creative groups and in the current digital world.
 To this end, Internet and Internet-based applications is an
important part of digital collaboration as they helps
employees collaborate in real-time, even beyond time zones
and geographical boundaries
Components of Digital
Collaboration
a) People: People are at the heart of collaboration
b) Collaborative tools: Digital Collaboration tools
includes many types including the following
 Communication tools: Communication tools include
options for integrated messaging, co-working
services, Privacy and access settings, Conference
calling, Video chats with screen sharing etc.
 Documentation and file sharing tools: This tools
includes features like Support for different file
types, Comments, and notes attached to files, track
changes and versioning, editing permissions and
access control, folder sharing , and more.
 Project Management tools: It has underlying
project and task management capabilities at their
core.
 Data Visualization tools: These tools should
support a range of visual styles, be easy and
quick to use, and be able to handle a significant
amount of data.
 Note taking tools: These tools help to quickly
capture and organize your notes, ideas, web page
content and more.
c) Device: Devices are also key players. Devices
such as smart phones, tablets, and laptops are
often an afterthought, but they are important
components of digital collaboration. . They are
the physical media we use to connect
1.5. Engaging in Citizenship through Digital
Technologies
 Digital citizenship refers to the responsible use of
technology by anyone who uses computers, the Internet,
and digital devices to engage with society on any level.
 It require the ability to engage positively, critically, and
competently in the digital environment to practice forms of
social participation that are respectful of human rights and
dignity through responsible use of technology.
 Good digital citizenship teaches peoples how to use digital
tools to communicate with one another.
 Poor digital citizenship includes things like online bullying,
careless social media use, and a general ignorance of
Internet safety
 It is about being active citizens who see possibilities instead
of problems, and opportunities instead of risks as they
curate a positive and effective digital footprint.
Key Terms
 Copyright - A copyright is a type of intellectual property
protection that protects original works of authorship,
which might include literary works, music, art, and more
 Digital citizenship- refers to the responsible use of
technology by anyone who uses computers, the Internet,
and digital devices to engage with society on any level.
 Digital collaboration - means working together and
accomplishing goals while using digital tools and
technology. It may consist of anything, such as devices,
programs, software, steps, or an entirely new technique.
 Digital identity is an online or networked identity adopted
or claimed in cyberspace by an individual, organization,
or electronic device.
Key Terms
 Intellectual property right - refers to a range of intangible
rights of ownership as an asset such as a software program
or designed information system
 Information Systems – are interrelated components
working together to collect, process, store, and
disseminate information to support decisionmaking.
 Information Technology (IT) - is the use of any computers,
storage, networking, and other physical devices,
infrastructure, and processes to create, process, store,
secure, and exchange all forms of electronic data
 Patent - a patent is a type of limited-duration protection
that can be used to protect inventions (or discoveries) that
are new, non-obvious, and useful, such as a new process,
machine, article of manufacture, or composition of matter.
Key Terms
 Trade secret- refers to specific, private information
that is important to a business because it gives the
business a competitive advantage in its
marketplace
 Trademarks refer to phrases, words, or symbols
that distinguish the source of a product or service
of one party from another.
 Social media addiction is a behavioral addiction
characterized by excessive concern for social
media, an insatiable want to access or use social
media, and a commitment of so much time and
energy to social media that it interferes with other
crucial facets of life
Discussion Questions.
1. What will be the possible legal consequences
of violating ethical issues in our information
systems use?
2. Discuss the emerging health issues associated
with the current digital devices use and
systems applications in our day-to-day life
3. What are the 3 common components of a
digital collaborations? Discuses each
component meaning and roles for effective
digital collaboration engagements.
4. What is the role of technology in enhancing
digital citizenship?
EN
O D
NE O
(1 F U
) NI
T

You might also like