Professional Documents
Culture Documents
To ICT: By: Alliah Vance O. Capuz 11 Abm A-St. Sebastian
To ICT: By: Alliah Vance O. Capuz 11 Abm A-St. Sebastian
to
ICT
by: alliah vance o. capuz
11 a b m a - s t . s e b a s t i a n
What is ICT?
ICT stands for Information and Communication Technology. It is the technology
required for infoirmation processing, in particular, the use of electronic computers,
communication devices, and software applications to convert, store, protect, process,
transmit, and retrieve information from anywhere, anytime.
The term ICT is also used to refer to the combining of audio-visual and telephone
networks with computer networks through a single cabling or link system. There are
large economic incentives (huge cost savings due to elimination of the telephone
network) to merge the telephone network with the computer network system using a
single unified system of cabling, signal distribution and management.
INFORMATI - Information refers to the knowledge obtained from reading,
investigation, study or research. The tools to transmit information
ONtelevision and radio. Information is knowledge and helps us to fulfill our daily
are the telephone,
tasks.
IMPACT
OF ICT IN
SOCIETY
EFFECTIVE
SOCIAL
SHARING ON
PROBLEMS
INFORMATION
PAPERLESS BORDERLESS
ENVIRONMENT COMMUNICATION
COMPUTER ETHICS
Computer ethics is a system of moral standards or values used as a guideline for computer
users. It is needed to stop the current technology products from being exploited. Ethics is a
moral philosophy where a person makes a specific moral choice and sticks to it. Code of
ethics in computing means moral guidelines to refer to when using the computer and the
Internet.
INTELLECTUAL PROPERTY
Intellectual property refers to any product of human intellect that is unique and has value in the
market place. This covers ideas, inventions, unique name, computer program codes and many
more.
PRIVA CYBER
Privacy in IT refers to data and Cyber law refers to any laws relating to
CY
information privacy. In general, data
LAW
protecting the Internet and other online
include texts, numbers, sounds, images communication technologies.
and video. Information privacy is It is also known as cyber crime law, is
described as the rights of individuals and legislation focused on the acceptable
companies to deny or restrict the behavioral use of technology including
collection and use of information about computer hardware and software, the
them. internet, and networks.
ETHICS
AND LAW
ETHICS LAW
Guideline: As a guideline to computer users. Control: As a rule to control computer user
Moral Standards: Ethical behaviour is judged by Judicial Standards Law: Law is judged by
moral standards. judicial standrads.
No Punishments: No punishment for anyone who Must Follow: Computer users must follow the
violates ethics. regulations and law.
Free to Folow: Computer users are free to follow Punishments: Penalties, imprisonments, and
or ignore the code of ethics. other punishments for those who break the law.
Immoral: Not honouring computer ethics means Depends On Country: Depends on country and
ignoring the moral elements (immoral). state where the crime is committed.
Produce Ethical Computer Users: To produce Crime: Not honouring the law means
ethical computer users. committing a crime.
INTELLECTUAL
PROPERTY LAWS
Intellectual property laws are needed to establish
and safeguard the intellectual property which refers
to works created by inventors, authors and artists. It
is also needed as businesses today continue to expand
globally. There are four types of Intellectual
Property protection. They are patents forinvention,
trademarks for brand identity, designs for product
appearance and copyright for material.
The Ways to Protect Privacy
PRIVACY LAW
The privacy laws in Malaysia emphasises on thePrivacy following:
1. Security Services to review the security policy
2. Security Management to protect the resources law
3. Security Mechanism to implement the required security services
4. Security Objects, the important entities within the system environment
UTILITIES SOFTWARE
Utilities . Example: anti-spam program, firewall, anti- spyware and
antivirus.software
Authentication and Verification Methods/ Technologies
Methods of authentication
here are two commonly used authentication methods,
which are biometric device and callback system.
Biometric device is a device that translates personal
characteristics into a digital code that is compared
with a digital code stored in the database. Biometric
devices include Fingerprint Recognition, Facial
Recognition, Hand Geogmetry, Iris Scanning, Retinal
Scanning, Voice Recognition and Signature
Verification. Callback system refers to the checking
system that authenticates the user.
methods of verification
Methods of VerificationThere are two methods
used in verification, which are user
identificationand processed object. User
identification refers to the process ofvalidating
the user. Processed object refers to something the
user hassuch as identification card, security token
and cell phone.
EFFECTS OF CONTROVERSIAL CONTENTS ON
SOCIETY
Pornography- can lead to criminal acts such asexploitation of women and
children can lead to sexualaddiction or perversion can develop low moral
valuetowards other men, women or children can erode goodreligious,
cultural and social beliefs and behaviou