ITGS Triangle
The three strands of ITGS
- Globalization means the diminishing importance of geographical, political, economic and cultural boundaries. IT has played a major role in reducing these boundaries. For example, any dramatic event anywhere in the world can be broadcast almost instantly by television or on the internet. However, the new “global village” may lead to the extinction of minority languages.
- Policies are enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies. They can be developed by governments, businesses, private groups or individuals. They normally consist of rules governing access to, or use of, information, hardware, software and networks. For example, a school policy on the use of IT would consist of each user signing an acceptable-use policy. It would also address unlawful access to the network through, for example, identity theft or using hacking software, and how these transgressions would be treated. Many websites also require users to agree to specific policies before allowing access to their services.
- Policies also affect the exchange of information, for example, by making it subject to copyright laws and raising people’s awareness of plagiarism. In general, policies can promote or restrict access, guide behaviour, require the fulfillment of certain conditions prior to or during use, or need to be developed to address unforeseen issues such as cyber-bullying.
1.8Globalization and cultural diversity
1.9Policies
1.6The digital divide and equality of access
- The growth of the use of IT systems has led to disparities in the use of, and access to, information technologies. Disparities exist not only internationally between countries, but also within countries between different socio-economic groups as well as within what may appear to be relatively homogenous groups. This may lead to groups or individuals without access to IT being disadvantaged. For example, while telelearning may bring previously unavailable opportunities to everyone’s doorstep, factors such as the cost and availability of hardware, software or access to the internet may create a “digital divide”.
- Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess employees’ performance. It can be used to support claims for promotion or to ensure that employees follow the organization’s internet policy appropriately.
1.7Surveillance
Social and Ethical Significance
Strand 1
Discussions of specified social/ethical consideration related to IT developments
1.1Reliability and integrity
- Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data with the real world. Data may be unreliable if it has been entered incorrectly or if it becomes outdated. The reliability of machines, software and data determines our confidence in their value.
- Integrity refers to safeguarding the accuracy and completeness of stored data. Data lacks integrity when it has been changed accidentally or tampered with. Examples of data losing integrity are where information is duplicated in a relational database and only one copy is updated or where data entries have been maliciously altered.
Stakeholders
- Security refers to the protection of hardware, software, machines and networks from unauthorized access. Security measures include restricted access to machines and networks for certain employees or to prevent access by hackers. The degree of security of information systems largely determines society’s confidence in the information contained in the systems.
1.2Security
1.3Privacy and Anonymity
- Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes anonymity when, for instance, a person uses it to conceal his or her true identity in order to cyber-bully someone else. Conversely, excessive privacy could also conceal the perpetrators of criminal, terrorist or computer hacking acts from law enforcement agencies.
- Intellectual property includes ideas, discoveries, writings, works of art, software, collections and presentations of data. Copyright, trademarks and patents exist to protect intellectual property. However, the easy and accurate duplication methods made available through IT can undermine such protection.
- Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is a user login to a network. A more advanced example would be the use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs.
1.4Intellectual property
Individuals or groups affected by IT developments and/or proposed solutions
1.5Authenticity
Standards and protocols are technical rules and conventions that enable compatibility and therefore facilitate communication or interoperability between different IT systems and their components. They might govern the design and use of hardware, software and information. For example, the communication protocols used on the internet, the ASCII representations for characters, or the design of the printer port on a personal computer are all governed by standards.
The use of IT systems brings significant advantages, for instance in ease of use, being available 24/7, or through its use rather than exposing humans to a potentially hazardous environment. However, this can raise concerns about the rate at which technology is being introduced and issues that may arise from insufficient testing in critical situations such as air traffic control. The ultimate fear of many people is that future systems will be programmed to make decisions that would be better taken by humans, such as the decision to deploy nuclear weapons.
There are also social impacts such as internet addiction, where people feel that they can never get away from IT and are trapped on a “digital treadmill”.
1.10Standards and protocols
1.11People and machines
- Digital citizenship can be defined as appropriate behaviour that represents the responsible, ethical and legal approach that individuals take in any situation with respect to the use of IT. Digital citizenship permeates, in one way or another, all of the preceding social and ethical considerations.
- Other social and ethical considerations may emerge during different scenarios discussed in class. These may be related to changes in attitudes towards the use of IT systems, or new developments in IT such as social networking or e-assessment.
1.12Digital citizenship
Other specific social and ethical considerations
2.5Home and leisure
Homes and home networks
IT management of home systems: for example, lighting, security, entertainment centres.
Digital entertainment
Films, photographs, music, arts, online and digital games, gambling, virtual worlds.
Social networking
Chat rooms, messaging, blogging, file sharing, wikis.
Published and broadcast information
Books, newspapers, digital radio and TV, e-books, podcasts.
Digital policing
Monitoring organizations such as the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA).
Hardware, software and networks
Portable digital devices and their ability to remotely control other devices, IT-enabled appliances
2.6Politics and government
Political processes
Online campaigning, voting, lobbying, fund-raising and advertising.
Government information sites
For example, travel warnings, tourist information, environmental information and warnings, government policies, city government websites.
Access to, and updating of, personal information held on government databases
Collection, storage and updating of personal data: for example, driving licence, TV licence, tax returns, passport applications and renewals, medical records, military service records, social security information, online police records.
Government control and use of information
Censorship, data matching across agencies, archiving, biometric data, national identity cards.
Law and order
Police surveillance, terrorist monitoring, DNA data.
Military
Cyberwarfare, smart weapons, espionage, battlefield technology.
2.2Education and training
Distance learning over large areas
- Hospitals, prisons, retirement homes, schools.
Use of IT in teaching and learning
- Educational software, online research and forums, virtual learning environments (VLE), e-books, Web 2.0 educational networks, use of mobile devices, game-based learning, fully immersive environments, filtering and monitoring of students’ internet use, 1-to-1, m-learning.
Hardware and network technologies in the classroom
- Laptop computers, handheld devices, interactive whiteboards.
Provision for special needs
- Inclusive software, Braille keyboards, accessibility.
School administration
- Record-keeping of staff and finances, libraries, student records, EDI (electronic data interchange).
Application to Specific Senarios
Scenarios used to address IT developments in the specified themes
2.1Business and employment
Traditional businesses
- Banks, including ATM (automatic teller machines), EFT (electronic funds transfer), hotels, supermarkets, travel agencies.
Online businesses (e-commerce)
- Working practices such as teleworking and home working.
Transportation
- Airline reservation systems, navigation, package tracking, traffic control systems, IT systems in cars.
2.4Health
2.3Environment
Modeling and simulations
- Climate change, forecasting natural events or demographic changes.
Data logging
- Sensors, probes, real-time data collection.
Satellite communication
- Remote sensing devices, satellite imagery, tagging.
Mapping, virtual globes
- Geographic information systems (GIS), global positioning systems (GPS), cell/mobile phone tracking, online journey planning, online maps.
E-waste
- Development, disposal and recycling of IT equipment, monitoring organizations such as the Basel Action Network.
Resource depletion
- Use of non-renewable resources for manufacturing components, electrical consumption of IT systems.
Diagnostic and therapeutic tools
- Surgery, prosthetic devices, diagnostic technology, rehabilitation, patient monitoring, individualized IT solutions for disabled people, accessibility.
Medical information, administration, marketing and sales
- Medical advice, e-prescriptions, telemedicine, electronic health records, international health cards.
Medical research
- Global collaboration, database for the Human Genome Project, improving patient rehabilitation.
Psychological and physical considerations
- Internet addiction, repetitive strain injury (RSI), ergonomics.