Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

1.1Reliability and integrity

Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data with the real world.

Integrity refers to safeguarding the accuracy and completeness of stored data.

1.2Security

Security refers to the protection of hardware, software, machines and networks from unauthorized access

1.3Privacy and anonymity

Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes anonymity when, for instance, a person uses it to conceal his or her true identity in order to cyber-bully someone else.

1.4Intellectual property

Intellectual property includes ideas, discoveries, writings, works of art, software, collections and presentations of data. Copyright, trademarks and patents exist to protect intellectual property.

1.5Authenticity

Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios, particularly in business and legal matters.

1.6The digital divide and equality of access

The growth of the use of IT systems has led to disparities in the use of, and access to, information technologies. Disparities exist not only internationally between countries, but also within countries between different socio-economic groups as well as within what may appear to be relatively homogenous groups. This may lead to groups or individuals without access to IT being disadvantaged.

1.7Surveillance

Surveillance is the use of IT to monitor the actions of people.

1.8Globalization and cultural diversity

Globalization means the diminishing importance of geographical, political, economic and cultural boundaries. IT has played a major role in reducing these boundaries. For example, any dramatic event anywhere in the world can be broadcast almost instantly by television or on the internet. However, the new “global village” may lead to the extinction of minority languages.

1.9Policies

Policies are enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies. They can be developed by governments, businesses, private groups or individuals. They normally consist of rules governing access to, or use of, information, hardware, software and networks.

1.10Standards and protocols

Standards and protocols are technical rules and conventions that enable compatibility and therefore facilitate communication or interoperability between different IT systems and their components. They might govern the design and use of hardware, software and information.

1.11People and machines

The use of IT systems brings significant advantages, for instance in ease of use, being available 24/7, or through its use rather than exposing humans to a potentially hazardous environment. However, this can raise concerns about the rate at which technology is being introduced and issues that may arise from insufficient testing in critical situations

Digital citizenship can be defined as appropriate behaviour that represents the responsible, ethical and legal approach that individuals take in any situation with respect to the use of IT. Digital citizenship permeates, in one way or another, all of the preceding social and ethical considerations.

2.1 Business and Employment:

Business environments range from a traditional (offline) business to businesses that are exclusively online.

Includes Traditional Businesses, E-Commerce, and Transportation.

2.2 Education and Training

Includes distance learning over large areas, use of IT in teaching and learning, Hardware and network technologies in the classroom, special needs equipment, and school administration.

2.3 Environment

Includes modeling and stimulation, data logging, satellite communication, maps, virtual globes, e-waste, and resource depletion.

2.4 Health

Includes diagnostic and therapeutic tools, medical information, administration, marketing and sales, and psychological and physical considerations

2.5 Home and Leisure

Includes homes and home networks, digital entertainment, social networking, published and broadcasting information, digital policing, and hardware, software, and networks.

2.6 Politics and Government

Includes political processes, government information sites, personal information on governmental websites, government control and use of information, law and order, and military.

3.1

The hardware topic deals with a computer system consisting of input devices, output devices, a central processing unit and storage.

-Non renewable resources.

3.2

The software topic deals with the software associated with a typical computer system.

- increased access for disabled people

- English as global language

3.3

This topic addresses the role of networks in a range of different scenarios. Almost all businesses, institutions and organizations, and an increasing number of households, are linked by networks.

-unauthorized access, intrusive software (viruses, worms and Trojan horses), spam, phishing, pharming, spoofing and identity theft

3.4

The internet and World Wide Web are omnipresent in contemporary society.

-e-commerce, academic research and social networking

-exposure to undesirable materials, cyber-bullying, e-fraud, improved communication between individuals and groups, intellectual property theft, plagiarism, spamming and the global dissemination of ideas

3.5

Developments in technology have allowed an increasing number of mobile devices to be developed that enable people to communicate anytime, anyplace, anywhere.

-health implications of mobile devices, unauthorized access to wireless networks, interception of communications, storage of personal communications for security purposes, and tracking of people

3.6

Multimedia/digital media involves the use and integration of media (for example, text, images and graphic elements, animation, sound and music, and video) to create digital products that are available online or offline.

- copyright, intellectual property, and current practices and policies used to grant permission for use.

3.7

Databases lie at the heart of most IT systems whether in businesses, organizations or other institutions. Databases enable organizations to maintain accurate and comprehensive records

-data mining

-data matching

3.9

All IT development requires a management method. Knowledge and understanding of the product development life cycle (PDLC) should be used as a framework to develop an IT solution for the internal assessment.

3.10

Extension of 3.9

Students should consider the interrelationship between stakeholders, IT systems, data, processes and policies, which provides the framework for the different project management approaches needed in order to accomplish the specified task.

3.11

The increasing capability of IT systems has allowed developers to implement systems that attempt to understand and imitate human behaviour. These systems have already had profound effects on society, although their effectiveness is largely determined by the accuracy of the algorithms that underpin them.

The increasing use of robotics, artificial intelligence (AI) and expert systems raises a range of ethical issues

3.12

Information systems specific to the annually issued case study

Additional subject content may be introduced as part of the annually issued case study. The additional terms will be listed as an appendix in the case study.

The ITGS Triangle

3.8

The increasing capabilities of computers have allowed individuals and organizations to develop software that can be used to test “what-if” scenarios and create simulations and models of real-world events.

Spreadsheets, through the use of worksheets and graphs, can be used to manage, predict using a series of “what-if” scenarios, and display financial details of businesses.

Modeling and simulations can be used to recreate or predict the conditions that may result from an event.

Strand 1: Social and Ethical Significance

Strand 3: IT Systems

1.12Digital citizenship

There are also social impacts such as internet addiction, where people feel that they can never get away from IT and are trapped on a “digital treadmill”.

Stand 2: Application to Specific Scenarios

Applies to...

Stakeholders

Who are...

Individuals or groups affected by IT developments and / or proposed solutions.

Learn more about creating dynamic, engaging presentations with Prezi