ICT in a Global Society

Download Report

Transcript ICT in a Global Society

Gaming
ICT Ethical Dilemmas
Social Networking
Primary & Secondary Sources
Cloud Computing
AI and robotics
Ecommerce
ICTICT
in a Global
inSociety
a
Global Society
ICT is good, but...
There are a lot of issues that arise with the
most popular uses for ICT today.
ICT is used mostly for:
 Gaming
 Social networking
 Cloud computing
 Robotics
 Ecommerce
Think about
Social issues
Ethical Issues
Legal Issues
Environmental Issues
...that arise from these 5 areas
Index
Computer
Gaming
Gaming Addiction
• Issues with computer gaming arise when generally
when people or groups are affected by it.
What’s your take on it?
Discuss the social, ethical, legal and
environmental issues.
Gaming Addiction
• Crave computer time
Gaming Addiction
• Overjoyed when at the computer
Gaming Addiction
• Unable to stop a computer activity
Gaming Addiction
• Irritable when not at the computer
• Everything else is annoying and boring...
Gaming Addiction
• Neglect family and friends
Gaming Addiction
• Problems at work or school
Unsuitable Games
• What’s an unsuitable game?
• Games that are of concern.
• Generally have either one or a combination of
excessive:
Violence
Racism
Sexism
Unacceptable acts that would be wrong in real life.
Unsuitable to
Impressionable People
• Impressionable people are generally young
people.
• There is also a minority of adults and teens.
• Shooters
• MMORPGs
– Massively multiplayer online role-playing game
“What? You mean you have RL friends?.... Nice.”
Discussion - Responsibility
Designers should build appropriate games
Marketers should monitor the distribution of games to
appropriate audiences
Parents should monitor what’s played
Children should be educated about gaming
Authorities need to take action over moral and ethical
issues associated with gaming
Gamers need to know themselves
Index
Social Networking
Benefits of social
networking
• Fill in student responses here....
Social Networking
Technology
Wikis – a site that allows easy creation and editing of
interlinking pages.
Blogs – part of a website, written by the person who runs
the blog. Generally a commentary or diary.
Mashup – a web app or page that is a combination of
separate parts. Info is supplied by an external site.
Folksonomies – allow users to interact with others by
tagging and categorising content, especially photos
Web 2.0 Tech
“Behind every web 2.0 techs there is always...”
A data base that stores the info
A web application access and displays the data
in the specific format.
Main technologies used in Web 2.0 are:
JavaScript,
AJAX
& Flash
Web 2.0 Tech continued
What is it and what are they doing?
A combo of technologies that can retrieve data
from a server in the background without
interfering with the display on the screen at
the time.
PHP
• Is a scripting language used for making
dynamic web pages
• Can also access databases dynamically and
send it to the “client side” to be displayed.
Social Networking Issues
• What’s your say?
Social Networking Issues
• Addiction
Social Networking Issues
• Predators
Social Networking Issues
• Privacy
Social Networking Issues
• Cyber Bullying
Social Networking Issues
•Copyright Issues
Social Networking Issues
• Security of information
How to avoid problems
with social networking
1.
2.
3.
4.
5.
6.
7.
Be sceptical about people
Be careful of the info you give out
Report suspicious behaviour
Inform people who are vulnerable
Watch your privacy settings
Be aware of copyright infringements
Use an Alias that only some know about
Index
Cloud
Computing
Lightning Quiz
Signs of Gaming Addiction
Irritable when not at the
computer
Unable to stop a computer
activity
Problems at work or school
Neglect family and friends
Overjoyed when at the
computer
Crave computer time
Behind every Web 2.0 tech
there is a?
Database
4 types of social media
•Wikis
•Blogs
•Mashup
•Folksonomies
Issues with social media
Addiction
Predators
Privacy
Cyberbullying
Copyright Issues
Security of information
What’s the cloud?
The Internet
A cloud is used to represent the
internet in network diagrams.
Cloud Computing Services
3 basic types
Virtual IT
Using a cloud company’s servers as virtual storage
Software Development
Use of software development tools, facilities and
services to create custom apps that will then run on
the cloud company’s servers
Software use
Sell licenses for their software to be used remotely
Examples of Cloud computing
•
•
•
•
•
•
Google Docs – create, edit docs online
Skype – phone calls
QuickBooks online – store & edit financial info
Online Web based games - Runescape
Online Backup – online storage
Salesforce – Online financial storage
Benefits of Cloud
• Make a 1-2 word summary of each dot point
listed in the textbook to help you remember.
p. 112
Issues with Cloud
• Make a 1-2 word summary of each dot point
listed in the textbook to help you remember.
p.112-113
Reducing the Risks
• Make a 1-2 word summary of each dot point
listed in the textbook to help you remember.
p.112-113
Do Cloud Qs on p.139
Index
Robotics &
Artificial
Intelligence
Artificial
Intelligence
Is the branch of IT that
designs robots and computer
programs to perform
“intelligent” actions similar
to those performed by human
intelligence.
Applications for AI
Expert systems - to give medical advice
Neural networks - to discover patterns in
business and scientific data
Computer games – chess, bots, simulations
Speech recognition – to control computers
or phone answering systems
Handwriting & character recognition – in
scanners and PDAs
Applications for AI
“Fuzzy Logic” – to run machines more
efficiently
Controlling Robotics in industry
Robotic toys
Comp Vision and Image processing – used
in surveillance and industry
Text Analysis– sort documents and large
amounts of text
Expert System
• A computer application that
performs a task that would
otherwise be performed by a
human expert.
• Deductive reasoning based on a
large database of information.
Neural Network
• A type of artificial intelligence
that attempts to imitate the way
a human brain works.
• A neural network works by
creating connections between
processing elements, the computer
equivalent of neurons.
• They are most effective for
predicting events when the
networks have a large database of
prior examples to draw on.
Fuzzy Logic
• Logic that recognises more than simple
true and false values.
• Propositions can be represented with
degrees of truthfulness and falsehood.
• E.g. The statement, today is sunny,
might be 100% true if there are no
clouds, 80% true if there are a few
clouds, 50% true if it's hazy and 0%
true if it rains all day.
• Fuzzy logic is used in expert system
and some spell checkers
2 lines of research
1st Line:
Trying to produce
results that are similar those
produced by humans. Brute force
calculations.
2nd Line:
Trying to produce
‘Strong’ AI which is similar to the
way humans think.
Eventually resulting is self
awareness?
Issues with Robots & AI
• The main issue with AI is
Trust in their results
Funny enough, the same problem
we have with human
intelligence...
Could Robots Ever
Harm Humans?
Discuss these issues:
Robots & AI are not as smart as
humans
Communication between humans &
robots
Robots cannot make decisions
about complex matters that
include values
Robots & AI replace humans
• Read section in textbook for
homework
Questions on p.139
Index
Ecommerce
Lightning Quiz
What is AI?
Name some AI applications:
∆ Expert systems
∆ Neural networks
∆ Voice recognition
∆ Fuzzy logic
∆ Robotic toys
∆ Computer game AI
∆ Text analysis
Issues with Robots & AI
• Robots & AI are not as
smart as humans
• Communication between
humans & robots
• Robots cannot make
decisions about complex
matters that include
values
• Robots & AI replace
humans
Electronic Commerce
We will look at 3 types of commerce
B2B
B2C
C2C
Ecommerce
Business to Business
E.g. A manufacturer selling online to a
wholesaler.
Ecommerce
Business to Customer
E.g. Businesses that sells online to customers
Ecommerce
Customer to Customer
E.g. Customers using the internet to sell to each
other.
Success
• Small, easily transported products
• Services that are mainly information
exchanges, like banking, auctions, online bill
payments.
Advantages
•
•
•
•
Open 24/7
It’s a fast way of getting info
Fast way of contacting suppliers/customers
Easy to show large amounts of data on the
Internet
• Can reach a large international audience
• Relatively low cost.
Buying & Payment issues
•
•
•
•
•
•
•
Privacy – you give them your info...
Reliability of supplier
Authenticity of goods
Safe Delivery of goods
Value/quality of goods
Extra costs – transportation
Handling complaints. Refunds, returns, ect
Spam
• Junk mail related to advertising
• The consequence of the growth of online
shopping
• 60% of email is bulk, advertising junk!
2 Main problem with spam is...
Phishing
• The content of spam is usually fruad!
• Fake appeals for money, get rich quick
schemes, cheap loans, leisure products, ect.
Botnet attacks
• Computers and servers are ‘taken over’ to
perform malicious tasks
• Commonly used to crash email servers by
bombarding them with emails.
Shopping Cart TEch
• Allows direct purchase from a website
How?
A shopping cart includes:
 A back end database
 A site to display the product
 Admin software used to manage the site
Disposal of ICT Products
Watch...
E-Waste Video
Ecommerce Questions
p.139
Index
Investigating & Analysing
ICT Issues & Ethical Dilemmas
Privacy of Information
Information privacy - the right of individuals and
companies to deny or restrict the collection and
use of information about them.
Some main points from laws about info privacy:
1.
2.
3.
4.
Info collected should be limited to what is necessary
Restricted access only to those that must see it
Info release requires permission from the individual
The individual needs to know info is being collected
Ownership of Information
• Copyright exists even without the ©
2 most common infringements include:
 Software piracy
 Unauthorised downloading of multimedia
o You still aren’t supposed to make backups in
Australia of software you’ve purchased
Issues not clearly covered by © law
• Page 123
• Analyse the 5 dot points
• Discuss with class
A process for analysing ICT issues
• Analyse the stakeholders and the uses of the information
technology being used.
Software Acquirement on the Internet
Software
company
Programmers
Adv
Advertising
Trial versions
DIS
Loss of sales
Downloaders
Adv
Advertising
Trial versions
DIS
Loss of royalties,
revenue for
work
Adv
Free, easy
access
programs
DIS
Possible virus
from
download
Make your own stakeholders flow
chart for another ICT issue
Solution Example
Software Acquirement on the Internet
Educate
users
ADV
Appeals to
people’s
morality
DIS
People will
still download
Index
Primary &
Secondary
Sources
Lightning Quiz
Name 3 main areas of Ecommerce
• B2B, B2C, C2C
What makes Ecommerce
successful?
Small, easily transported products
Electronic services
Advantages
Disadvantages
SPAM?
Phishing?
Botnet?
Issues with disposal of ICT
products?
What is info privacy?
Two most common copyright
infringements?
Primary Sources
• Come from stakeholders usually
• Provide data that needs to be processed and
analysed to produce information.
Secondary Sources
• Provide info from others who heave already
investigated the issue or provided relevant
info.
How do you get the data?
• Most commonly through surveys or
questionnaires
• Done face to face, in groups or online
• Interviews are the most useful as you can
gauge feelings & attitudes
Designing Questionnaires
Design your questions to produce data that is:
•
•
•
•
•
Of a suitable format
Reliable
Accurate
Timely
Free from bias
Making a Questionnaire
•
•
•
•
•
•
•
Research the issue or topic
Establish a main focus point
List questions that need answers
Choose the type of survey instrument
Write questions in suitable format
Choose a sample of people to survey
Report on the results using visual
representations and written feedback
Questions: Open or Closed
• Closed Qs = yes/no, one word responses or
multiple choice
• Open Qs = require a longer response.
using what, why, when, how, explain,
describe, ect... This makes a question open.
Conducting Interviews / Questionnaires
Interviews:
• Usually one to one basis
• Recorded (with permission)
Questionnaires
• Individually or in groups
• Paper, computer or internet based
Data Validation
• Easy for errors to occur during input phase
• Use manual and electronic validation methods
• Manual methods?
• E.g. Proofreading
• Electronic methods?
• E.g. Drop downs
• Both used to ensure accurate input
Analysing Questionnaires / Interviews
o Time consuming
o Interviews need to be transcribed
o Answers need to be summarised
o All answers transferred to master copy.
o Overall summaries made
o Analyse data, record trends and findings
o Reach a conclusion based on your original goal
Referencing Primary Sources
• They need to cited or referenced the same
way secondary sources are.
• Once analysis has been done and a conclusion
reached, it becomes a secondary source
• Can be turned into a graphical representation
Make your own Questionnaires
• Make a paper based questionnaire on a topic
of your choosing.
• Must have 10 questions minimum
Make your own Questionnaires
• Make an interview
• Must have 10 questions minimum
• Conduct the interview on a fellow class mate
Analyse the information
• Sort the info and state your findings
• Make your conclusions
Secondary Sources
• Traditionally books newspapers & journals
• Now it’s online text documents, audio and video.
• Use search engines to find what you need
• Secondary sources:
• Wikipedia
• YouTube
Metasearch engines
• Cluster results into groups
• Results can give you a broad selection of
material you can browse
Check the Quality
•
•
•
•
•
•
Is it clear who’s written it?
Are the aims of the site clear, Bias?
Is it relevant?
Can the info be checked?
When was it produced? Up to date?
Does it give all the options?
Referencing
• All sources used need to be referenced in a
bibligoraphy
• Heaps of styles: APA, Harvard, MLA, Oxford
• Styles change depending on what it is you are
referencing
• Eg, a journal is referenced different from a book,
online document or web site.
Referencing Examples
Harvard: Book reference
Bessant, J & Webber, R 2001, 'Policy and the youth sector: youth
peaks and why we need them', Youth Studies Australia, vol.
20, no. 1, pp. 43-47.
APA: Electronic Journal Reference
• Kavanagh, K., Absalom, K., Beil, W., & Schliessmann, L.
(1999). Connecting and becoming culturally
competent: A Lakota example. Advances in Nursing
Science, 21, 9-31. Retrieved March 26, 2001 from
ProQuest/Nursing Journals database.
Wait for it....
Congratulations
This is the end of the chapter
ICT in the global society is no more....
Until the exam