STS Chapter 8 GROUP 7 The Age of Information Technology - 20240914 - 102148 - 0000
STS Chapter 8 GROUP 7 The Age of Information Technology - 20240914 - 102148 - 0000
STS Chapter 8 GROUP 7 The Age of Information Technology - 20240914 - 102148 - 0000
8:
THE AGE OF
INFORMATION
TECHNOLOGY
WHAT IS INFORMATION
TECHNOLOGY?
Information is a processed data with a meaning. It is organized, and has
a useful interpretation of data. On the other hand technology has to do
with tools, machines, and systems to apply change in a human-made
environment. This implies that information technology (IT) is the
transmission of information requiring the use of systems specifically
computers, and telecommunications, for storing, retrieving and sending
information
The Information Technology Association of America defined Information
Technology as "the study, design, development, application,
implementation, support or management of computer-based
information systems."
ICT covers storage, retrieval, manipulation and
transmission of information in a digital form. This
happens through the use of desktops, emails,
podcast, vodcast, cloud storage and the like. Skills
Framework for the Information Age is a source for
describing and managing skills needed for ICT
professionals especially at this time when Business
Process Outsourcing companies are very much in
need of IT professionals to serve clients across the
globe.
DEVELOPMENTS IN
INFORMATION
COMMUNICATION
TECHNOLOGY (ICT)
The advancement and application of Information
Communication Technology (ICT) is changing. It is
evident at this point that every organization and
enterprise needs efficient IT systems to carry out
daily tasks. A computer network that is secured and
is competently connected is a requirement to carry
out productive operations.
1. CLOUD
COMPUTING
1 Defined as the usage of computing services
through a software as well as hardware.
User interface has undergone a revolution since introduction of touch screen. The
touch screen capability has revolutionized way end users interact with
application. Touch screen enables the user to directly interact with what is
displayed and removes any intermediate hand-held device like the mouse. Touch
screen capability is utilized in smart phones, tablet, information kiosks and other
information appliances.
4. ANALYTICS
The field of analytics has greatly progressed over the years. It is a
process which helps in discovering the informational patterns within a
data. The field of analytics is a combination of statistics, computer
programming and operations research.
Notably, firms can now outsource their manufacturing to other nations such as in
the case of industrial and economic zones operating in the Philippines and rely on
telecommunications to keep production, distribution and marketing attuned. This
has demanded an influx of workers with specific skills. Thus, technology has even
refined division of labor and accurate coordination entirely through computer
networks and communication technologies.
THE RISE OF E-
COMMERCE
The key areas of cost reduction when carrying out a sale via electronic commerce
rather than in a traditional store involving physical establishment, order placement
and execution, customer support, staffing, inventory carrying, and distribution. It is
definitely cost-effective to maintain a virtual store than a physical one as it is always
open and can be accessed by millions of prospective clients across the globe. With
the Internet, e-commerce is rapidly expanding into a fast-moving, open global
market with an ever-increasing number of participants.
The open and global nature of e-commerce is likely to increase market size and change
market structure, in terms of both the number and size of players and the way in which
players compete on international markets. Digitized goods also known as electric goods
or e-goods include e-books, digital images, music files, software, manuals are
electronically stored. These files can cross borders in real time and consumers can shop
24 hours a day, seven days a week. And in the midst of stiff market competition, firms
are searching for strategies to be competitive online by improving their online shops'
User Interface (UI) as well as User Experience (UX). Interface (UI) as well as User
Experience (UX).Interface (UI) as well as User Experience (UX).Experience (UX).
REMOTE WORK
It is a way to allow individuals to communicate with one another in ways that do not
require f2f interaction.
These technologies utilize communication infrastructures that are both global and
up 24/7. Interaction between superiors and subordinates will become stiff because
of control issues raised by the use of computerized monitoring systems such as the
software 'Time Doctor' which records every worker online, but on the other hand,
the use of e-mail will lower the barriers to communications across different status
levels, resulting in more uninhibited communications between supervisor and
subordinates.
WORK FLEXIBLY
The importance of distance is reduced by computers and communication
technologies. Telecommuting are now an accepted practice in the world of work.
Workers can do most of their work at home rather than in a centralized workplace if
they opt to work home based. Technology has evidently changed how people work.
The gig-economy has also changed how people work. More and more people are
choosing to work as freelancers and independent contractors in multiple jobs in
different local and overseas jobs. Working remote in virtual platforms has become
attractive especially among millennials and this is being noticed by companies and
organizations worldwide.
Some scammers will send you emails with links which if opened can hack
confidential data from your computer or handheld device. Anyone who opens the
link falls as a helpless victim to these scammers as they can now access your bank
data, records, emails, assets and almost all credentials that you are keeping online.
SO WHAT ARE THESE TYPES OF
SCAMS? 419 scam
This scam involves payments which fraudsters can demand from you while promising a large
sum of money from a proposed inheritance or winnings in the lottery. This can happen once you
receive an email promising a share from the lump sum amount to be claimed if an upfront fee
is sent. This 'to good to be true' promises is enough to make one suspicious. The promise
initially comes from a person of authority like an army general or a prime minister which makes
one believe without question. But these are all fake and their main intent is to lure you to trust
them until soon you'll not hear from them again.
SIM SWAP SCAM
In this scam, fraudsters are able to duplicate your SIM without your
knowledge. They will be able to receive OTPs, phone verifications, calls as
well as receive notifications to commit fraudulent activities.
PHISHING
SCAM
Phishing happens when fraudsters send you emails from a reliable institutions or
companies. The email will request you to click on an icon or a link which opens a
fake website which will then require details from you. Such details may include your
credit card details. The culprits can now use your card details to purchase online. It
is important to check if websites are secured to identify if these are legitimate
websites.
REMOTE ACCESS TAKEOVER
SCAM
This happens when you unintentionally allow your computer to be vulnerable to
'Remote Access Control.' This happens through a software which can be downloaded
from your desktop. If you're so trusting then the scammer will be able to install
some suspicious software into your PC to do the trick. So if the urgent call from
someone you don't know sounds dubious then you have to deny them outright
because they can easily access sensitive information from you.
VISHING
SCAM
The increase in mobile banking gave fraudsters greater opportunity to access bank
details from customers. Often the victim receives a call from a 'bank personnel
'asking for OTP or One time Pin for verification. If you allow this, then you allow the
scammer to access your bank account.
SO HOW CAN YOU AVOID BEING VICTIMIZED
BY THESE FRAUDSTERS?
1. Understanding how these criminal works is the best way to protect yourself, your identity and
your property.
2. Never click on any link or attachments. Delete those messages even if you're so curious to
know what's in that message.
3. Ignore scam phone messages or calls as you may be talking to the scammer and not the
authorized personnel.
4. Be cautious about those asking for your account numbers, checking accounts as crooks are so
creative in getting hold of those access.
5. Remember the basic point that 'If you didn't enter the contest then it is improbable to win it.'
6. Never be an easy target to criminals. Scammers are always on the look for those who are very
trusting like those searching for jobs, for partners, for 'easy' money.
CONSIDER THESE #WFH TIPS TO ENABLE YOU TO
ADJUST TO THE NEW NORMAL:
1. Since working remote means using technologies, then you need to master the use of project
management tools which assist individuals or teams to efficiently organize and manage tasks
and projects;
2. Learn to adapt to the use of computerized monitoring systems such as 'Time Tracking
productivity tools which measure or track your speed in accomplishing your tasks by recording
quantity of the mouse clicks and keyboard stroke you make. This software also 'screenshots'
your work as well as creates online reports, and activity descriptions.
3. Master the use of 'browser-based word processors'. This is an online 'word processor which
gives user the ability to create, edit, save, and access your documents from anywhere. This
software allows sharing of documents, tracking changes and even revert to earlier versions
while collaborating with team mates.
4. Learn to communicate using emails and team chats. Modern messaging apps have resulted
in more uninhibited communications between supervisors and subordinates which results to
better and collaborative output.
CONSIDER THESE #WFH TIPS TO ENABLE YOU TO ADJUST
TO THE NEW NORMAL:
5. Do research on best practices from reliable Internet sources like forums, blogs and other
credible sites. This will surely provide you with the knowledge about the latest trends in your field
which surely you can apply in accomplishing your tasks.
6. Be sure to get a reliable and stable Internet provider. Your connection must be Ethernet,
wireless is a no-no in an online job. It is also probable that employers will require you to do some
'speed tesť to check if you can serve the purpose of working online. Your productivity is highly
reliant on this as well.
7. Prepare a quiet place that is conducive to work within the confines of your home. Most
employers require a workstation that is free from 'domestic distractions' like pets making noises;
children running around etc. A quiet, noise-free work environment is very necessary especially
during video calls.
8. Prepare your desktop or laptop with at least 1.6 GHz processor, 2 GB RAM and 40 GB free
space. A backup laptop is also important just in case problems arise (such as power outage). A
good headset is also essential for scheduled meetings.
SUMMARY:
These technologies utilize communication infrastructures that are
both global and up 24/7. Interaction between employers and
employees has become stronger while it minimized communication
barriers. The uninhibited communication between supervisors and
subordinates resulted to better and collaborative output. And while
distance is reduced by computers and communication, workers can
now perform most of their work at home rather than in a centralized
workplace and work on flexible schedules and even multi-task which
consequently reduces job stress and increased job satisfaction.
THANK
YOU