ICS2604 Notes
ICS2604 Notes
1. Information Technology
2. Communication Technology
3. Construction Technology
4. Medical Technology
6. Business Technology
7. Educational Technology
1
○ Communication: Technology enables easy contact with loved ones
abroad but has downsides like the misuse of social media.
● Disadvantages of Modern Technology
○ Social Media: Negative impacts like online bullying, reduced in-person
interactions, and a shift in Filipino cultural values.
○ Health Impacts: Sedentary lifestyles and potential harm to eyesight
and posture due to excessive screen time.
○ Family Time: Technology reduces family interaction, as kids and
teenagers spend more time online.
○ Cultural Shift: Technology alters traditional Filipino practices, such as
addressing people with "po" and "opo."
● Impact on Culture
○ Modern Life: Technology influences behaviors, such as online
shopping, virtual jobs, and the use of social media.
○ Internet Usage: The Philippines ranks high in internet users,
influencing culture through trends like K-pop and online employment.
● Ethical Issues in Technology
○ Ethics Definition: A system of moral principles guiding right and wrong
decisions.
○ IT Ethical Dilemmas:
■ Plagiarism: Copying others' work and claiming it as your own.
■ Piracy: Illegal copying of software.
■ Hacking: Presents moral dilemmas depending on intent (e.g.,
damaging a system vs. understanding it).
■ Computer Crime: Includes fraud, theft, and spamming.
■ Health Issues: Ergonomics helps mitigate health risks from IT
use (e.g., back pain from prolonged sitting).
2
● Specific Ethical Concerns
○ Digital Divide: Gap between those with access to technology and those
without.
○ Gender Discrimination: Women in IT face barriers, though more
women are entering the field now.
○ Nanotechnology: Raises ethical questions, especially in medical
applications.
○ Expert Systems: AI systems assist in areas like healthcare but present
ethical concerns regarding accuracy and speed.
○ Genetic Engineering: Ethical debates arise around manipulating life
forms.
● Data Privacy and Intellectual Property
○ Netiquette: Ethical behavior online is essential, with intellectual
property rights protecting creators.
○ Data Collection: The Data Privacy Law regulates how personal data is
collected, stored, and accessed.
○ Speed of Technology: Fast operations can facilitate unethical actions
quickly.
○ Vendor-Client Relations: Ethical issues in the supplier-consumer
dynamic, particularly with hardware and software sales.
3
Netiquette
● Netiquette Overview:
○ Netiquette (network etiquette) refers to proper behavior online.
Respect others' views and follow common courtesy.
○ With the rise of technology, phones have become central to
communication, especially among students.
● Classroom Etiquette:
○ Follow rules about phone usage in class. Silence or turn off phones if
instructed by the professor.
○ Use phones for educational purposes only when allowed.
● Common Online Misbehaviors:
○ Flaming: Posting hostile or aggressive messages.
○ Shouting: Using all capital letters in text, which can be seen as
shouting.
○ Avoid insults, vulgar language, and oversharing personal information.
● Best Practices for Online Interaction:
○ Always check the credibility of sources.
○ Avoid sharing personal information on social media.
○ Think before posting or sharing content. Consider future
consequences.
○ Check privacy settings regularly.
● Communication Basics:
○ Types of Communication: Formal (professional settings) and informal
(personal).
○ Elements of Communication:
■ 7% through spoken words.
■ 38% through tone of voice.
4
■ 55% through body language.
○ Effective communication requires listening and understanding the
message.
● Netiquette Guidelines:
○ Always consider the context and audience when posting online.
○ Respect the time and boundaries of others.
○ Ensure professionalism in online interactions, especially in business or
educational contexts.
● Email Etiquette:
○ Greet the recipient and introduce yourself clearly.
○ Make requests direct but polite.
○ Use a proper closing statement (e.g., "Sincerely," "Best regards").
○ Avoid emotional responses, check spelling, and ensure attachments
are correct.
○ Only CC people if necessary; avoid using BCC unless there's a good
reason.
● Mistakes in Online Communication:
○ Forwarding virus alerts unrelated to the recipient.
○ Engaging in flame wars or communicating with trolls.
○ Sharing personal information or pictures with people you meet online.
● Social Media and Blogging:
○ Maintain professionalism if using social media for professional
purposes.
○ Keep personal and professional accounts separate.
○ In blog posts, ensure content is appropriate, links are relevant, and
design (e.g., color, navigation) is user-friendly.
● General Online Behavior:
○ Always be polite and use appropriate language.
○ Avoid typing in all caps, as it conveys shouting.
5
○ Never share personal information, such as addresses or phone
numbers, without consent.
● Final Advice:
○ Behave respectfully online, double-check spelling and information, and
always present your best digital self.
6
Social Networking
7
○ Extract important data from social media platforms.
○ Prepare for worst-case scenarios.
● Password Security:
○ Use strong passwords with a mix of lowercase, uppercase, numbers,
and symbols.
○ Consider using password management tools or one-time password
systems.
○ Tools like Password Meter can help assess password strength.
● Checking Account Security:
○ Use services like Norton to check if your email or password has been
compromised.
○ Verify if websites are legitimate using security tools.
● System Security Tips:
○ Stay updated with software and operating systems.
○ Install and update anti-malware software.
○ Avoid using open Wi-Fi connections.
○ Use VPNs and enable firewalls on your home router.
○ Disconnect from networks when not in use.
● Content Sharing and Privacy Tips:
○ Before posting, consider if it could cause problems for you.
○ Limit your audience by dividing friends into groups.
○ Share public information publicly, and keep personal feelings for close
friends.
● Network and Privacy Guidelines:
○ Don't connect with people you don’t know personally.
○ Limit your visibility on social platforms.
○ Set location check-ins to “friends only” and avoid sharing private
locations like home or work.
8
● Security Features to Enable on Social Platforms:
○ Google: Enable two-step verification, turn off geolocation and facial
recognition in photos.
○ Facebook: Enable secure browsing, login notifications, trusted friends,
and manage devices logged in.
○ Twitter: Protect tweets to allow only approved followers to see them.
○ LinkedIn: Check privacy controls, especially for information sharing
with third-party sites.
● General Tips:
○ Always update software and settings.
○ Be selective when choosing friends or connections.
○ Think carefully before posting or tweeting.