MODULE 1: INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY Pβππ‘π ππππππ‘: βπ‘π‘ππ ://π€π€π€. πππ1. ππ/2019/04/02/3 − π‘βππππ − ππππ’π‘ − πππ‘ − ππ‘ − ππ£πππ¦ − ππ’π ππππ π − π βππ’ππ At the end of this lesson, the students should be able to: 1. improve their knowledge on how ICT affects their everyday lives and the state of our nation; 2. compare and contrast the differences between online platforms, sites, and content; 3. understand the features of Web 2.0; 4. understand the future of the World Wide Web through Web 3.0; and 5. learn the different trends in ICT and use them to their advantage. "It has become appallingly obvious that our technology has exceeded our humanity." — Albert Einstein Information and Communication Technology (ICT) deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send and edit information. ο± Access to information: Possibly the greatest effect of ICT on individuals is the huge increase in access to information and services that has accompanied the growth of the Internet. Some of the positive aspects of this increased access are better, and often cheaper, communications. In addition, the use of ICT to access information has brought new opportunities for leisure and entertainment, the facility to make contacts and form relationships with people around the world, and the ability to obtain goods and services from a wider range of suppliers. ο± Improved access to education, e.g. distance learning and on-line tutorials. New ways of learning, e.g. interactive multi-media and virtual reality. New job opportunities, e.g. flexible and mobile working, virtual offices and jobs in the communications industry. ο± New tools, new opportunities: The second big effect of ICT is that it gives access to new tools that did not previously exist. A lot of these are tied into the access to information mentioned above, but there are many examples of stand-alone ICT systems as well: a) ICT can be used for processes that had previously been out of the reach of most individuals, e.g. photography, where digital cameras, photo-editing software and high quality printers have enabled people to produce results that would previously required a photographic studio. b) ICT can be used to help people overcome disabilities. e.g. screen magnification or screen reading software enables partially sighted or blind people to work with ordinary text rather than Braille. ο± Job loss: One of the largest negative effects of ICT can be the loss of a personβs job. This has both economic consequences, loss of income, and social consequences, loss of status and self esteem. Job losses may occur for several reasons, including: Manual operations being replaced by automation. e.g. robots replacing people on an assembly line.Job export. e.g. Data processing work being sent to other countries where operating costs are lower. Multiple workers being replaced by a smaller number who are able to do the same amount of work. e.g. A worker on a supermarket checkout can serve more customers per hour if a bar-code scanner linked to a computerized till is used to detect goods instead of the worker having to enter the item and price manually. ο± Reduced personal interaction: Being able to work from home is usually regarded as being a positive effect of using ICT, but there can be negative aspects as well. Most people need some form of social interaction in their daily lives and if they do not get the chance to meet and talk with other people they may feel isolated and unhappy. ο± Reduced physical activity: A third negative effect of ICT is that users may adopt a more sedentary lifestyle. This can lead to health problems such as obesity, heart disease, and diabetes. Many countries have workplace regulations to prevent problems such as repetitive strain injury or eyestrain, but lack of physical exercise is rarely addressed as a specific health hazard. ο± Communication: By using ICT has brought a number of benefits to organizations, such as: Cost savings by using e.g. VoIP instead of normal telephone, email / messaging instead of post, video conferencing instead of traveling to meetings, e-commerce web sites instead of sales catalogues. Access to larger, even worldwide, markets. Web sites can be seen from all parts of the world and orders can be taken wherever there is a compatible banking system to process payments, e.g. credit / debit card, Pay-Pal, bank transfer facility. Web sites also have 24 hour opening and are available every day of the year. Flexible response. Organisations with good communications can respond to changes quickly. This may mean better customer relations, an improved supply chain for goods and services, faster development of new products to meet a new opportunity, etc. ο± Information management: Organizations can benefit from using ICT for information management. e.g. Data mining of customer information to produce lists for targeted advertising. Improved stock control, resulting in less wastage, better cash flow, etc.Mangers are better informed and will have more reliable and up-to-date information on which to base their decisions. ο± Security: Although the use of ICT can bring its own security issues, see next section, it can also solve or reduce some security problems, e.g. Encryption methods can keep data safe from unauthorized people, both while it is being stored or while it is being sent electronically. This is important for reasons such as data protection legislation or commercial secrecy. ICT enables physical security systems such as fingerprint, iris or facial recognition. ο± Cost: the cost of using ICT may cause a number of problems for organizations. A lot of ICT hardware and software is expensive, both to purchase and to maintain. An ICT system usually requires specialist staff to run it and there is also the challenge of keeping up with ever-changing technology. These extra costs should be offset by the poitive effects of using ICT, but if an organisation gets its cost-benefit analysis wrong it may lose money. ο± Competition: this is usually thought of as being a good thing, but for some organisations being exposed to greater competition can be a problem. If the organisation is competing for customers, donations, or other means of funding nationally or even internationally, they may lose out to other organisations that can offer the same service for less money. ο± Security: this is always a problem for any organisation that uses ICT. Data must be kept secure, Internet connections must be protected from attack, new viruses and other forms of malware are released nearly every day. Organizations will usually have legal obligations to protect data such as customer information. Even if the organisation does not have to comply with a specific data protection law it will usually be in the organisation’s interest to protect data from rivals. Probably the largest effect that ICT use has on on society is allowing members of society to have greatly increased access to information. This can have numerous positive effects, such as: a) increasing opportunities for education; b) improving communication; and c) allowing people to participate in a wider, even worldwide, society. Probably the largest effect that ICT use has on on society is allowing members of society to have greatly increased access to information. This can have numerous negative effects, such as: causing a digital divide between those who can access information and those who cannot, reducing levels of education and understanding due to the vast amount of incorrect and misleading information that is available causing moral and ethical problems due to the nature of some of the material available. The positive impact of ICT on education: On the positive side, the use of ICT in education can provide opportunities that might not otherwise exist, such as: 1) distance learning, where students can access teaching materials from all over the world, 2) the ability to perform „impossibleβ experimentsβ by using simulations, 3) the possibility for students to have individual learning programs within a topic, rather than everybody having to do the same thing at the same time at the same pace. More able students can be given more challenging work, less able students can access remedial lessons. When the World Wide Web was invented, most web pages were static. Static (also known as flat page or stationary page) in the sense that the page is “as is” and cannot be manipulated by the user. The content is also the same for all users. This is referred to as Web 1.0. Photo credit: https://disenowebakus.net/en/the-web Web 2.0 is the evolution of Web 1.0 by adding dynamic web pages—the user is able to see a website differently than others. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, and web applications. Photo credit: https://disenowebakus.net/en/web-2 Web 2.0 allows users to interact with the page: instead of just reading a page, the user may be able to comment or create a user account. Web 2.0 also allows users to use web browsers instead of just using their operating system. Browsers can now be used for their user interface, application software (or web applications), and even for file storage. Photo credit: https://www.ravendigimark.com/blog/what-is-web-2 Most websites that we visit today are Web 2.0. ο± Folksonomy. It allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging). Popular social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#). This is also referred to as hashtag. Photo credit: https://medium.com/@shiriendamra/folksonomy-a-key-aspect-ofmodern-information-architecture-cac367a3a957 ο± Rich User Experience. Content is dynamic and is responsive to userβs input. An example would be a website that shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website. Photo credit: https://ashwinrk1115.wordpress.com/rich-user-experience/ ο± Long Tail. Services are offered on demand rather than on a one-time purchase. In certain cases, timebased pricing is better than file-sizebased pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used. Photo credit: http://www.rogerclarke.com/EC/Web2C.html ο± User Participation. The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comment, reviews, and evaluation. Some websites allow readers to comment on an article, participate in a poll, or review a specific product (e.g., Amazon.com, online stores). Photo credit: https://janetnovakblog.wordpress.com/2016/10/31/leveraging-participatory-culture-within-the-advertising-industry/ ο± Software as a Service. Users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows the user to create and edit word processing and spreadsheet documents online. When you need a software, like a Word Processor, you can purchase it for a one-time huge amount and install it in your computer and it is yours forever. Software as a service allows you to “rent” a software for a minimal fee. Photo credit: https://labs.sogeti.com/salesforce-spotlight-saas-software-as-a-service-companies/ ο± Mass Participation. It is a diverse information sharing through universal web access. Since most users can use the Internet, Web 2.0βs content is based on people from various cultures. Photo credit: https://soni1220.wordpress.com/2011/01/26/web-1-0-web-2-0-web-3-0-web-4-0-%E2%80%93-wh The Semantic Web is a movement led by the World Wide Web Consortium (W3C). The W3C standard encourages web developers to include semantic content in their web pages Photo credit: https://disenowebakus.net/en/web-3 According to the W3C, “The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries.” The aim of Web 3.0 is to have machines (or servers) understand the userβs preferences to be able to deliver web content specifically targeting the user. Photo credit: https://blockgeeks.com/guides/web-3-0/ Photo credit: https://chamnanvanakit.wordpress.com/2013/08/02/web-1-0-2-0-and-3-0/ 1. Compatibility HTML files and current web browsers could not support Web 3.0. 2. Security The userβs security is also in question since the machine is saving his or her preferences. 3. Vastness The World Wide Web already contains billions of web pages. 4. Vagueness Certain words are imprecise. The words “old” and “small” would depend on the user. 5. Logic Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time. 1. Convergence Technological convergence is the synergy of technological advancements to work on a similar goal or task. 2. Social Media Social media is a website, application, or online channels that enable web users to create, co-create, discuss, modify, and exchange user-generated content. ο± Social Networks. These are sites that allow you to connect with other people with the same interests or background. ο± Bookmarking Sites. These are sites that allow you to store and manage links to various websites and resources. ο± Social News. These are sites that allow users to post their own news items or links to other news sources. ο± Media Sharing. These are sites that allow you to upload and share media content like images, music, and video. ο± Microblogging. These are sites that focus on short updates from the user. ο± Blogs and Forums. These websites allow users to post their content. 3. Mobile Technologies The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devicesβ capability to do tasks that were originally found in personal computers. ο± iOS ο± Android ο± Blackberry OS ο± Windows Phone OS ο± Symbian ο± WebOS ο± Windows Mobile 4. Assistive Media Assistive media is a nonprofit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user. Do you have any question? You may go to our conference and consult! ο± Innovative Training Works Inc. (2016) Empowerment Technology ο± Rouse M. (n.d) Pharming, retrieved from: https://searchsecurity.techtarget.com/definition/pharming#:~:text=1)%20Pharming %20is%20a%20scamming,%22phishing%20without%20a%20lure.%22 ο± Swinhoe, D. (2018) Keyloggers, retrieved from: https://www.csoonline.com/article/3326304/what-is-a-keylogger-how-attackers-canmonitor-everything-you-type.html ο± Belding, G. (2019) Malware, retrieved from: https://resources.infosecinstitute.com/topic/malware-spotlight-rogue-securitysoftware/ ο± Ajahana (2012) The Positive and Negative impacts of ICT, retrieved from: https://ajahana.wordpress.com/2012/06/27/the-positive-and-negative-impacts-ofict-5/ Rules of Netiquette Photo credit: https://www.lessonplansdigger.com/2015/07/10/5-minute-speaking-activity-net At the end of this lesson, the students should be able to: 1. consider one’s and others’ safety when sharing information using the Internet; 2. consider one’s and others’ reputation when using the Internet; 3. determine and avoid the dangers of the Internet; 4. be responsible in the use of social networking sites; and 5. browse the Internet efficiently and properly through proper referencing. βWhat you post online speaks VOLUME about who you really are. POST with intention. REPOST with caution.β β Germany Kent The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing. 1. Malware – stands for malicious software Types: Virus, Worm, Trojan, Spyware, Adware 2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware. 3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details. Rogue security software refers to a program that induces internet fraud by using security exploits on a target system to mislead, scare or deceive the user into downloading a program, either free for by paying money, in exchange for the removal of malware it claims is on the target system. If the user complies, the result is the installation of more malware. Sometimes, rogue security software will threaten the user with ransomware if they do not pay up. Rogue security software goes by different names, including the following: • Scareware • Fraudware • Rogue scanner • Rogue antivirus Keyloggers are a type of monitoring software designed to record keystrokes made by a user. One of the oldest forms of cyber threat, these keystroke loggers record the information you type into a website or application and send to back to a third party. Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. Pharming has been called "phishing without a lure." Photo credit: https://www.cbronline.com/what-is/what-is-cybercrime-4898190/ Identity theft is the crime of obtaining the personal or financial information of another person for the sole purposes of assuming that personβs name or identity to make transactions or purchases. Photo credit: https://i-sight.com/resources/what-is-deepfake-identity-theft/ In criminal identity theft, a criminal misrepresents himself as another person during arrest to try to avoid a summons, prevent the discovery of a warrant issued in his real name or avoid an arrest or conviction record. Photo credit: https://www.globallearningsystems.com/tips-for-identifying-and-preventing-id In medical identity theft, someone identifies himself as another person to obtain free medical care. Photo credit: https://www.medwastemngmt.com/blog/medical-identity In financial identity theft, someone uses another person's identity or information to obtain credit, goods, services or benefits. This is the most common form of identity theft. Photo credit: https://www.consumerjungle.org/jungle-talk/-what-is-id-theft-care In child identity theft, someone uses a child's identity for various forms of personal gain. This is common, as children typically do not have information associated with them that could pose obstacles for the perpetrator, who may use the child's name and Social Security number to obtain a residence, find employment. Photo credit: https://www.noidentitytheft.com/child-identity-theft/ Synthetic identity theft is a type of fraud in which a criminal combines real (usually stolen) and fake information to create a new identity, which is used to open fraudulent accounts and make fraudulent purchases. Photo credit: https://tnj.com/10-steps-to-recover-if-your-identity-is-stole Phishing is a cybercrime in which scammers send a malicious email to individual(s) or mass users of any organization by impersonating a known individual or a business partner or a service provider. It is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. Photo credit: https://mytechdecisions.com/network-security/university-phishing-attacks- Appears to come from a wellknown company like Netflix and asks you to sign in and correct an issue with your account. Links points to a website pretending to be a company’s legitimate site and asks for your log in credentials TIP: Do not click any links in the email- directly log in to your account by typing the address into your web browser. If you are unable to log in, contact service using official contact information. Contains a link to what appears to be shared file on Google docs, drop box or another file sharing. Link points to a page pretending to be a file-sharing site and requests you log in. TIP: Do not click any links in the email, instead, log in to your account and find the shared file by name. Remember to verify sender identity and use established Cloud file sharing services. Comes from a domain similar to the DocuSign domain. Link will prompt you to sign into view the document, giving attackers control of your inbox. TIP: DocuSign never attaches item in email attachments are likely malicious. Instead, access documents directly at www.docusign.com. Contains document presented as an unpaid invoice and claims service will be terminated if invoice is not paid. TIP: Do not reply to email. Contact the vendor/service directly using official contact information before submitting payment. Appears to come from a popular delivery service or online retail and includes delivery notification with a malicious link or attachment. TIP: Do not click links or open attachments in unexpected website and enter the tracking information or call the delivery service’s official phone number. Appears to come from a government tax revenue agency. Claims you are delinquent on your taxes and provide a means to the issue before additional fines or legal actions are pursued. Photo credit: https://www.trendmicro.com/vinfo/ph/security/news/cybercrime-and-digital-threats/what-you Hacking is the gaining of unauthorized access to data in a system or computer. Photo credit: https://www.information-age.com/criminal-computer-hacking-123477 If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property. 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. 3. Set your post to “private.” In this way, search engines will not be able to scan that post. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate. Do you have any question? You may go to our conference and consult! ο± Innovative Training Works Inc. (2016) Empowerment Technology ο± Rouse M. (n.d) Pharming, retrieved from: https://searchsecurity.techtarget.com/definition/pharming#:~:text=1)%20Pharming %20is%20a%20scamming,%22phishing%20without%20a%20lure.%22 ο± Swinhoe, D. (2018) Keyloggers, retrieved from: https://www.csoonline.com/article/3326304/what-is-a-keylogger-how-attackers-canmonitor-everything-you-type.html ο± Belding, G. (2019) Malware, retrieved from: https://resources.infosecinstitute.com/topic/malware-spotlight-rogue-securitysoftware/ ο± Ajahana (2012) The Positive and Negative impacts of ICT, retrieved from: https://ajahana.wordpress.com/2012/06/27/the-positive-and-negative-impacts-ofict-5/