0% found this document useful (0 votes)
21 views9 pages

ICS2604 Notes

Uploaded by

justbautistaa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views9 pages

ICS2604 Notes

Uploaded by

justbautistaa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Trends and Issues in Technology

● Effects and Importance of Modern Technology


○ Modern Technology: Advanced tools improving tasks for convenience.
○ Why Modern Technology?: Growing demands for innovation, especially
in IT, help make tasks easier and more efficient.
○ Daily Life: Technology like the internet provides better access to
essential needs.
● Types of Technology

1. Information Technology

2. Communication Technology

3. Construction Technology

4. Medical Technology

5. Entertainment Technology (e.g., Netflix)

6. Business Technology

7. Educational Technology

● Effects of Modern Technology


○ Access to Technology: Urban areas (e.g., Manila) have more access,
while rural areas often rely on older technology.
○ Transportation: Innovations like Grab and Angkas have changed
commuting in cities.
○ Media & Devices: Advancements in mobile devices allow multitasking,
replacing multiple separate gadgets (e.g., phone, camera, radio).

1
○ Communication: Technology enables easy contact with loved ones
abroad but has downsides like the misuse of social media.
● Disadvantages of Modern Technology
○ Social Media: Negative impacts like online bullying, reduced in-person
interactions, and a shift in Filipino cultural values.
○ Health Impacts: Sedentary lifestyles and potential harm to eyesight
and posture due to excessive screen time.
○ Family Time: Technology reduces family interaction, as kids and
teenagers spend more time online.
○ Cultural Shift: Technology alters traditional Filipino practices, such as
addressing people with "po" and "opo."
● Impact on Culture
○ Modern Life: Technology influences behaviors, such as online
shopping, virtual jobs, and the use of social media.
○ Internet Usage: The Philippines ranks high in internet users,
influencing culture through trends like K-pop and online employment.
● Ethical Issues in Technology
○ Ethics Definition: A system of moral principles guiding right and wrong
decisions.
○ IT Ethical Dilemmas:
■ Plagiarism: Copying others' work and claiming it as your own.
■ Piracy: Illegal copying of software.
■ Hacking: Presents moral dilemmas depending on intent (e.g.,
damaging a system vs. understanding it).
■ Computer Crime: Includes fraud, theft, and spamming.
■ Health Issues: Ergonomics helps mitigate health risks from IT
use (e.g., back pain from prolonged sitting).

2
● Specific Ethical Concerns
○ Digital Divide: Gap between those with access to technology and those
without.
○ Gender Discrimination: Women in IT face barriers, though more
women are entering the field now.
○ Nanotechnology: Raises ethical questions, especially in medical
applications.
○ Expert Systems: AI systems assist in areas like healthcare but present
ethical concerns regarding accuracy and speed.
○ Genetic Engineering: Ethical debates arise around manipulating life
forms.
● Data Privacy and Intellectual Property
○ Netiquette: Ethical behavior online is essential, with intellectual
property rights protecting creators.
○ Data Collection: The Data Privacy Law regulates how personal data is
collected, stored, and accessed.
○ Speed of Technology: Fast operations can facilitate unethical actions
quickly.
○ Vendor-Client Relations: Ethical issues in the supplier-consumer
dynamic, particularly with hardware and software sales.

3
Netiquette

● Netiquette Overview:
○ Netiquette (network etiquette) refers to proper behavior online.
Respect others' views and follow common courtesy.
○ With the rise of technology, phones have become central to
communication, especially among students.
● Classroom Etiquette:
○ Follow rules about phone usage in class. Silence or turn off phones if
instructed by the professor.
○ Use phones for educational purposes only when allowed.
● Common Online Misbehaviors:
○ Flaming: Posting hostile or aggressive messages.
○ Shouting: Using all capital letters in text, which can be seen as
shouting.
○ Avoid insults, vulgar language, and oversharing personal information.
● Best Practices for Online Interaction:
○ Always check the credibility of sources.
○ Avoid sharing personal information on social media.
○ Think before posting or sharing content. Consider future
consequences.
○ Check privacy settings regularly.
● Communication Basics:
○ Types of Communication: Formal (professional settings) and informal
(personal).
○ Elements of Communication:
■ 7% through spoken words.
■ 38% through tone of voice.

4
■ 55% through body language.
○ Effective communication requires listening and understanding the
message.
● Netiquette Guidelines:
○ Always consider the context and audience when posting online.
○ Respect the time and boundaries of others.
○ Ensure professionalism in online interactions, especially in business or
educational contexts.
● Email Etiquette:
○ Greet the recipient and introduce yourself clearly.
○ Make requests direct but polite.
○ Use a proper closing statement (e.g., "Sincerely," "Best regards").
○ Avoid emotional responses, check spelling, and ensure attachments
are correct.
○ Only CC people if necessary; avoid using BCC unless there's a good
reason.
● Mistakes in Online Communication:
○ Forwarding virus alerts unrelated to the recipient.
○ Engaging in flame wars or communicating with trolls.
○ Sharing personal information or pictures with people you meet online.
● Social Media and Blogging:
○ Maintain professionalism if using social media for professional
purposes.
○ Keep personal and professional accounts separate.
○ In blog posts, ensure content is appropriate, links are relevant, and
design (e.g., color, navigation) is user-friendly.
● General Online Behavior:
○ Always be polite and use appropriate language.
○ Avoid typing in all caps, as it conveys shouting.

5
○ Never share personal information, such as addresses or phone
numbers, without consent.
● Final Advice:
○ Behave respectfully online, double-check spelling and information, and
always present your best digital self.

6
Social Networking

● Types of Social Networking Services:


○ Social networking: Facebook, Google+, LinkedIn, Twitter
○ Content sharing: Pinterest, Facebook, Dropbox, Google Drive
○ Location-based services: Foursquare, Google, Facebook, Goala
● Types of Protection:
○ Security: Preventing malicious actions to systems or information.
○ Safety: Preventing physical or mental harm.
○ Privacy: Preventing exposure of sensitive information.
● Default Sharing Settings:
○ Most services default to public sharing; switch to private if desired.
○ Examples of mostly open platforms: Facebook, Twitter, LinkedIn.
○ Examples of mostly closed platforms: Dropbox, chat services.
● Risks in Social Networking:
○ Privacy loss: Sensitive data exposed.
○ Reputation loss: Damaged reputation via your account or others.
○ Data loss: Loss of posts, photos, or content.
○ Access loss: Inability to access your account, often due to
compromised passwords.
○ Control loss: Others having control of your account.
○ Employment: Employers using social media for background checks.
○ Legal proceedings: Lawyers and judges using social media content in
legal cases.
● Recommendations for Social Networking Use:
○ Realize social networking is not free—you're paying with your privacy.
○ Review security and privacy settings regularly.
○ Deactivate or delete accounts if not needed.

7
○ Extract important data from social media platforms.
○ Prepare for worst-case scenarios.
● Password Security:
○ Use strong passwords with a mix of lowercase, uppercase, numbers,
and symbols.
○ Consider using password management tools or one-time password
systems.
○ Tools like Password Meter can help assess password strength.
● Checking Account Security:
○ Use services like Norton to check if your email or password has been
compromised.
○ Verify if websites are legitimate using security tools.
● System Security Tips:
○ Stay updated with software and operating systems.
○ Install and update anti-malware software.
○ Avoid using open Wi-Fi connections.
○ Use VPNs and enable firewalls on your home router.
○ Disconnect from networks when not in use.
● Content Sharing and Privacy Tips:
○ Before posting, consider if it could cause problems for you.
○ Limit your audience by dividing friends into groups.
○ Share public information publicly, and keep personal feelings for close
friends.
● Network and Privacy Guidelines:
○ Don't connect with people you don’t know personally.
○ Limit your visibility on social platforms.
○ Set location check-ins to “friends only” and avoid sharing private
locations like home or work.

8
● Security Features to Enable on Social Platforms:
○ Google: Enable two-step verification, turn off geolocation and facial
recognition in photos.
○ Facebook: Enable secure browsing, login notifications, trusted friends,
and manage devices logged in.
○ Twitter: Protect tweets to allow only approved followers to see them.
○ LinkedIn: Check privacy controls, especially for information sharing
with third-party sites.
● General Tips:
○ Always update software and settings.
○ Be selective when choosing friends or connections.
○ Think carefully before posting or tweeting.

You might also like