STS Chapter 8 GROUP 7 The Age of Information Technology - 20240914 - 102148 - 0000

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 33

CHAPTER

8:
THE AGE OF
INFORMATION
TECHNOLOGY
WHAT IS INFORMATION
TECHNOLOGY?
Information is a processed data with a meaning. It is organized, and has
a useful interpretation of data. On the other hand technology has to do
with tools, machines, and systems to apply change in a human-made
environment. This implies that information technology (IT) is the
transmission of information requiring the use of systems specifically
computers, and telecommunications, for storing, retrieving and sending
information
The Information Technology Association of America defined Information
Technology as "the study, design, development, application,
implementation, support or management of computer-based
information systems."
ICT covers storage, retrieval, manipulation and
transmission of information in a digital form. This
happens through the use of desktops, emails,
podcast, vodcast, cloud storage and the like. Skills
Framework for the Information Age is a source for
describing and managing skills needed for ICT
professionals especially at this time when Business
Process Outsourcing companies are very much in
need of IT professionals to serve clients across the
globe.
DEVELOPMENTS IN
INFORMATION
COMMUNICATION
TECHNOLOGY (ICT)
The advancement and application of Information
Communication Technology (ICT) is changing. It is
evident at this point that every organization and
enterprise needs efficient IT systems to carry out
daily tasks. A computer network that is secured and
is competently connected is a requirement to carry
out productive operations.
1. CLOUD
COMPUTING
1 Defined as the usage of computing services
through a software as well as hardware.

it provides benefits to its users such that it reduces


2
the IT infrastructure cost of the company; it promotes
the concept of virtualization which enables server
and storage device to be used within the organization
and finally, it allows the maintenance of software and
hardware a lot easier as no installation is required.
1. CLOUD
COMPUTING
3 Some of the issues
concerning cloud
computing are:
privacy, compliance,
security, legal, abuse,
IT governance.
2. MOBILE
A trend within informationAPPLICATION
technology is the use of mobile applications which are
actually software applications on smart phones, androids and the like. Mobile
application or mobile app is a complete success since its introduction in the
commercial market. Apps are designed to run on smartphones, tablets and other
mobile devices. They are also available for download from selected mobile operating
systems. Some of the mobile apps are available free for a certain amount to cover
download cost. The app distributor and the app developer share the income from
the payments.
3. USER
The user interface (UI) INTERFACES
is the point of human-computer interaction and
communication in a device. This can include display screens, keyboards, a
mouse and the appearance of a desktop.

User interface has undergone a revolution since introduction of touch screen. The
touch screen capability has revolutionized way end users interact with
application. Touch screen enables the user to directly interact with what is
displayed and removes any intermediate hand-held device like the mouse. Touch
screen capability is utilized in smart phones, tablet, information kiosks and other
information appliances.
4. ANALYTICS
The field of analytics has greatly progressed over the years. It is a
process which helps in discovering the informational patterns within a
data. The field of analytics is a combination of statistics, computer
programming and operations research.

In area of data analytics, predictive analytics and social analytics, it is


notable how analytics is used. Hence, data analytics can be used to
support decision-making process as it converts raw data into meaningful
information. On the other hand, predictive analytics is used to forecast
events based on current and historical information while social media
analytics as a tool is for companies to understand and accommodate
customer needs and requirements.
THE SIGNIFICANT IMPACT OF
INFORMATION TECHNOLOGY
For the past decades, all indications show that technology and the use of
information technology will continue to progress. The increase in the
acquisition and use of new information technologies is brought about by
the declining cost of communications as a result of rapid technological
innovations and increased competitiveness of networks and companies
mass- producing hand held devices.
Electronic commerce or E-commerce is one of the most notable
developments in the Internet. It is a new way of conducting business
through the World Wide Web where buyers and sellers meet and do
business. It greatly influences financial and retail trade.
THE SIGNIFICANT IMPACT OF
INFORMATION TECHNOLOGY
Technology has also expanded to education as open universities and
distance learning is widely offered now by several colleges and
universities through the use of the Learning Management Systems (LMS).
THE RISE OF E-
COMMERCE
Information technology defies time and space which directly affects the exertion of
effort as it reduces travel time and distance. Varied industries have realized that
workers may not necessarily come from a single location such as working in an
office-based environment.

Notably, firms can now outsource their manufacturing to other nations such as in
the case of industrial and economic zones operating in the Philippines and rely on
telecommunications to keep production, distribution and marketing attuned. This
has demanded an influx of workers with specific skills. Thus, technology has even
refined division of labor and accurate coordination entirely through computer
networks and communication technologies.
THE RISE OF E-
COMMERCE
The key areas of cost reduction when carrying out a sale via electronic commerce
rather than in a traditional store involving physical establishment, order placement
and execution, customer support, staffing, inventory carrying, and distribution. It is
definitely cost-effective to maintain a virtual store than a physical one as it is always
open and can be accessed by millions of prospective clients across the globe. With
the Internet, e-commerce is rapidly expanding into a fast-moving, open global
market with an ever-increasing number of participants.
The open and global nature of e-commerce is likely to increase market size and change
market structure, in terms of both the number and size of players and the way in which
players compete on international markets. Digitized goods also known as electric goods
or e-goods include e-books, digital images, music files, software, manuals are
electronically stored. These files can cross borders in real time and consumers can shop
24 hours a day, seven days a week. And in the midst of stiff market competition, firms
are searching for strategies to be competitive online by improving their online shops'
User Interface (UI) as well as User Experience (UX). Interface (UI) as well as User
Experience (UX).Interface (UI) as well as User Experience (UX).Experience (UX).
REMOTE WORK
It is a way to allow individuals to communicate with one another in ways that do not
require f2f interaction.

These technologies utilize communication infrastructures that are both global and
up 24/7. Interaction between superiors and subordinates will become stiff because
of control issues raised by the use of computerized monitoring systems such as the
software 'Time Doctor' which records every worker online, but on the other hand,
the use of e-mail will lower the barriers to communications across different status
levels, resulting in more uninhibited communications between supervisor and
subordinates.
WORK FLEXIBLY
The importance of distance is reduced by computers and communication
technologies. Telecommuting are now an accepted practice in the world of work.
Workers can do most of their work at home rather than in a centralized workplace if
they opt to work home based. Technology has evidently changed how people work.
The gig-economy has also changed how people work. More and more people are
choosing to work as freelancers and independent contractors in multiple jobs in
different local and overseas jobs. Working remote in virtual platforms has become
attractive especially among millennials and this is being noticed by companies and
organizations worldwide.

Through these developments in the nature of job brought by information technology


working from home, telecommuting and working remote has remarkably reduced
everyday expenses and burnout considering that multiple jobs are available on
flexible schedules.
DISTANCE
EDUCATION
Advancements in information technology have brought about the development of
CAI or computer-assisted-instruction. The same will complement traditional
classroom instruction. The teacher as the trainer and mentor motivates,
encourages, evaluates and helps in the learning of students. Though there is a need
for face to face (f2f), the integration of information technology improves productivity
and enriches the learning experience of students. Developing solutions to the given
problems largely operates through technology utilized in schools through virtual
learning environments, simulations which are available on the Internet and offers
much convenience. E-mail, drop boxes, learning software, Learning Management
Systems (LMS) and mobile applications simplify the learning process. These
educational technologies vastly simplify collaboration between students and
teachers and even between students themselves who are engaged in group
workloads. Text can be combined with audio, images and videos utilized through real
time real time interactions through Skype, face time, Zoom, Facebook-Messenger
and other platforms. Distance learning via the Internet and Learning Management
DISTANCE
Consequently the changes EDUCATION
associated with these rapid technological advances in
education demand an upgrade of professional skills through the reinforcement of
modern existing systems of learning both in the public and private sectors.
Educational technologies must be utilized to respond to the needs of all learners.
CYBER CRIMES
The increase in content presented in a digital form results in easier and cheaper
duplication and distribution of information. This is the case of book contents being
copy-pasted and even image properties which can easily be posted on the Internet.
These can all be exposed online and be utilized by any individual for whatever intent
they have. This evidently violates intellectual property rights which is an issue being
raised against the wide use of information technology. It can reduce the incentives
of creators, writers, authors, distributors and publishers alike.
CYBER CRIMES
A vast array of questions is posed relating to intellectual property rights and
protection. Mechanisms to control this reality brought about the development of
software and applications that may prove that there was a scrupulous intent on the
part of the perpetrator. Such includes the anti-plagiarism tools and other measures
to reduce if not totally eradicate pirating of ideas. Censorship alone does not appear
to be an efficient solution. The dissemination of information to the consumers,
readers and enthusiasts through the World Wide Web or the Internet itself can
somehow spread the idea that such activity is actually a crime. Indeed the rapid
increase in computing and communications power has raised considerable concern
about privacy both in the public and private sector.
CYBER CRIMES
No one is 100% aware of who currently collects data about individuals, how will this
be used, misused and shared. Cybercrime is on the rise, identity thefts are
proliferating. Phishing of information is rampant. Phishing, according to Wikipedia, is
the attempt to obtain sensitive information such as usernames, passwords, and
credit card details often for malicious reasons, by disguising as a trustworthy entity
in an electronic communication. These concerns lower the consumers' trust in online
institutions such as in the use of e-banking. There is information overload and even
'fake news' which creates a serious barrier to the freedom of information of
individuals.
CYBER CRIMES
It is a popular wisdom that people today suffer information overload. A lot of the
information available on the Internet is incomplete and even incorrect. People spend
more and more of their time absorbing irrelevant information which are all available
in the single click on the computer. Indeed dependence on technology can bring
risks. Flaws in the technological infrastructure can cause hindrances to everyday
functions such as the possible presence of malwares and Trojans which can be
injected onto critical institutions such as bank data systems and government
institutions. These are vital communications and information processing services
which can definitely cause widespread economic disruption. An example of which
was the global fear raised by the Y2K virus at the turn of the century which made
people and institutions panic as it has threatened all those who are hooked to the
use of computer technologies.
HOW DO YOU PROTECT YOURSELF
FROM SCAMS?
Recent findings have revealed how more than 50,000 individuals were reported
victimized by scammers. Thousands of dollars were taken from them and not a cent
was returned. Scams appear in varied forms, targeting entrepreneurs and customers
using sophisticated tools facilitated by online technology.
HOW DO SCAMMERS
OPERATE?
Most common scams developed out of new techniques. Fraudsters are emerging
and they will lure you into providing them confidential information about you which
may include your email credentials, contact number and personal profile.

Some scammers will send you emails with links which if opened can hack
confidential data from your computer or handheld device. Anyone who opens the
link falls as a helpless victim to these scammers as they can now access your bank
data, records, emails, assets and almost all credentials that you are keeping online.
SO WHAT ARE THESE TYPES OF
SCAMS? 419 scam

This scam involves payments which fraudsters can demand from you while promising a large
sum of money from a proposed inheritance or winnings in the lottery. This can happen once you
receive an email promising a share from the lump sum amount to be claimed if an upfront fee
is sent. This 'to good to be true' promises is enough to make one suspicious. The promise
initially comes from a person of authority like an army general or a prime minister which makes
one believe without question. But these are all fake and their main intent is to lure you to trust
them until soon you'll not hear from them again.
SIM SWAP SCAM
In this scam, fraudsters are able to duplicate your SIM without your
knowledge. They will be able to receive OTPs, phone verifications, calls as
well as receive notifications to commit fraudulent activities.
PHISHING
SCAM
Phishing happens when fraudsters send you emails from a reliable institutions or
companies. The email will request you to click on an icon or a link which opens a
fake website which will then require details from you. Such details may include your
credit card details. The culprits can now use your card details to purchase online. It
is important to check if websites are secured to identify if these are legitimate
websites.
REMOTE ACCESS TAKEOVER
SCAM
This happens when you unintentionally allow your computer to be vulnerable to
'Remote Access Control.' This happens through a software which can be downloaded
from your desktop. If you're so trusting then the scammer will be able to install
some suspicious software into your PC to do the trick. So if the urgent call from
someone you don't know sounds dubious then you have to deny them outright
because they can easily access sensitive information from you.
VISHING
SCAM
The increase in mobile banking gave fraudsters greater opportunity to access bank
details from customers. Often the victim receives a call from a 'bank personnel
'asking for OTP or One time Pin for verification. If you allow this, then you allow the
scammer to access your bank account.
SO HOW CAN YOU AVOID BEING VICTIMIZED
BY THESE FRAUDSTERS?
1. Understanding how these criminal works is the best way to protect yourself, your identity and
your property.

2. Never click on any link or attachments. Delete those messages even if you're so curious to
know what's in that message.

3. Ignore scam phone messages or calls as you may be talking to the scammer and not the
authorized personnel.

4. Be cautious about those asking for your account numbers, checking accounts as crooks are so
creative in getting hold of those access.

5. Remember the basic point that 'If you didn't enter the contest then it is improbable to win it.'

6. Never be an easy target to criminals. Scammers are always on the look for those who are very
trusting like those searching for jobs, for partners, for 'easy' money.
CONSIDER THESE #WFH TIPS TO ENABLE YOU TO
ADJUST TO THE NEW NORMAL:
1. Since working remote means using technologies, then you need to master the use of project
management tools which assist individuals or teams to efficiently organize and manage tasks
and projects;

2. Learn to adapt to the use of computerized monitoring systems such as 'Time Tracking
productivity tools which measure or track your speed in accomplishing your tasks by recording
quantity of the mouse clicks and keyboard stroke you make. This software also 'screenshots'
your work as well as creates online reports, and activity descriptions.

3. Master the use of 'browser-based word processors'. This is an online 'word processor which
gives user the ability to create, edit, save, and access your documents from anywhere. This
software allows sharing of documents, tracking changes and even revert to earlier versions
while collaborating with team mates.

4. Learn to communicate using emails and team chats. Modern messaging apps have resulted
in more uninhibited communications between supervisors and subordinates which results to
better and collaborative output.
CONSIDER THESE #WFH TIPS TO ENABLE YOU TO ADJUST
TO THE NEW NORMAL:
5. Do research on best practices from reliable Internet sources like forums, blogs and other
credible sites. This will surely provide you with the knowledge about the latest trends in your field
which surely you can apply in accomplishing your tasks.

6. Be sure to get a reliable and stable Internet provider. Your connection must be Ethernet,
wireless is a no-no in an online job. It is also probable that employers will require you to do some
'speed tesť to check if you can serve the purpose of working online. Your productivity is highly
reliant on this as well.

7. Prepare a quiet place that is conducive to work within the confines of your home. Most
employers require a workstation that is free from 'domestic distractions' like pets making noises;
children running around etc. A quiet, noise-free work environment is very necessary especially
during video calls.

8. Prepare your desktop or laptop with at least 1.6 GHz processor, 2 GB RAM and 40 GB free
space. A backup laptop is also important just in case problems arise (such as power outage). A
good headset is also essential for scheduled meetings.
SUMMARY:
These technologies utilize communication infrastructures that are
both global and up 24/7. Interaction between employers and
employees has become stronger while it minimized communication
barriers. The uninhibited communication between supervisors and
subordinates resulted to better and collaborative output. And while
distance is reduced by computers and communication, workers can
now perform most of their work at home rather than in a centralized
workplace and work on flexible schedules and even multi-task which
consequently reduces job stress and increased job satisfaction.
THANK
YOU

You might also like