SlideShare une entreprise Scribd logo
1  sur  16
INFORMATION AND COMMUNICATION
       TECHNOLOGY AND SOCIETY
   1.1.1.1 Define ICT.

         ICT is the technology required for information
    processing, in particular, the use of electronic computers,
    communication devices and software applications to
    convert, store, protect, process, transmit and retrieve
    information from anywhere, anytime.
   INFORMATION
            Information refers to the knowledge obtained from reading,
    investigation, study or research. The tools to transmit information are the
    telephone, television and radio. Information is knowledge and helps us to
    fulfill our daily tasks.
   COMMUNICATION
          Communication is an act of transmitting messages. It is a process
    whereby information is exchanged between individuals using symbols, signs
    or verbal interactions. Communication is important in order to gain
    knowledge.
   TECHNOLOGY
          Technology is the use of scientific knowledge, experience and
    resources to create processes products that fulfill human needs.
    Technology is vital in communication
   1.1.1.2 Evolution of computers.
COMPUTER GENERATIONS

   First Generation (1940-1956)

   SECOND GENERATION (1956-1963)

   THIRD GENERATION (1964-1971)

   FOURTH GENERATION (1971- PRESENT)

   FIFTH GENERATION (PRESENT & BEYOND)

   NEW ERA COMPUTER
   1.1.2.1 The usage of ICT in everyday life

◊ EDUCATION
              In education, teachers, students, researchers and school administrators benefits from the usage of
    ICT.


◊   BANKING
             In the banking, customers, businessman & bank administrator benefits from the usage of ICT.
◊   INDUSTRY

            Computers are used to facilitate production planning and control systems, to support chain
    management and to help in product design in the industrial sector. In the industrial sector, workers, researchers
    and administrator benefits from the usage of ICT.
◊ E-COMMERCE

             E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient
    and faster. For this application, computers, Internet and shared software are needed. In the e-commerce sector,
    customers, suppliers and employees benefits from the usage of ICT.
1.1.2.2 Differences between computerised and non-computerised
  systems.
         Computerised                          Non-Computerised
         more interesting & interactive       depends on teachers & textbook
         experiences

         all transactions are done by         banking was done manually
         computers

         Computers and                        Production was slow because
         telecommunications industry           everything was done depended on
         became very popular and profitable    human labour.
         since production can be increased
         through an all day operation.
         E-commerce plays an important        Trading was made using the barter
         role in the economic scene. It        system and it was then later
         includes distribution, buying,        developed into currency.
         selling and servicing products that
         are done electronically
FASTER
                COMMUNICATION
                   SPEED

   SOCIAL                              LOWER
  PROBLEMS                          COMMUNICATION
                                        COST



                   impact of
                    ICT on
                    society
 BORDERLESS                        RELIABLE MODE OF
COMMUNICATION                       COMMUNICATION




                                 EFFECTIVE
         PAPERLESS
                                SHARING OF
        ENVIRONMENT
                               INFORMATION
COMPUTER ETHICS
Computer ethics is a system of moral standards or
  values used as a guideline for computer users. It is
  needed to stop the current technology products from
  being exploited.

Ethics is a moral philosophy where a person makes a
  specific moral choice and sticks to it. Code of ethics
  in computing means moral guidelines to refer to when
  using the computer and the Internet.
INTELLECTUAL PROPERTY

Intellectual property refers to any product of human intellect
  that is unique and has value in the market place. This covers
  ideas, inventions, unique name, computer program codes and
  many more.

PRIVACY
Privacy in IT refers to data and information privacy. In general,
  data include texts, numbers, sounds, images and video.
  Information privacy is described as the rights of individuals
  and companies to deny or restrict the collection and use of
  information about them.

CYBER LAW
Cyber law refers to any laws relating to protecting the Internet
  and other online communication technologies.
ETHICS                             LAW
 Guideline: As a guideline to          Control: As a rule to control
computer users.                        computer users.
 Moral Standards: Ethical behaviour    Judicial Standards: Law is judged
is judged by moral standards.          by judicial standards.
 No Punishments: No punishment for     Must Follow: Computer users must
anyone who violates ethics.            follow the regulations and law.
 Free To Follow: Computer users are    Punishments: Penalties,
free to follow or ignore the code of   imprisonments and other punishments
ethics.                                for those who break the law.
 Immoral: Not honouring computer       Depends On Country: Depends on
ethics means ignoring the moral        country and state where the crime is
elements (immoral).                    committed.
 Universals: Universal, can be         Prevent Misusing Of Computers: To
applied anywhere, all over the world   prevent misuse of computers.
 Produce Ethical Computer Users: To    Crime: Not honouring the law
produce ethical computer users         means committing a crime.
Intellectual property laws are needed to
 establish and safeguard the intellectual
 property which refers to works created
  by inventors, authors and artists. It is
     also needed as businesses today
  continue to expand globally. There are
    four types of Intellectual Property
     protection. They are patents for
invention, trademarks for brand identity,
   designs for product appearance and
          copyright for material.
•he privacy laws in Malaysia emphasises on the

Privacy
             following:
            •Security Services to review the security policy
             Security Management to protect the resources
  law        Security Mechanism to implement the required
             security services Security Objects, the important
             entities within the system environment




Utilities   •Example: anti-spam program, firewall, anti-
             spyware and antivirus.
software
Methods of Authentication
  There are two commonly used authentication methods, which are biometric
    device and callback system. Biometric device is a device that translates
   personal characteristics into a digital code that is compared with a digital
      code stored in the database. Biometric devices include Fingerprint
    Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal
   Scanning, Voice Recognition and Signature Verification. Callback system
          refers to the checking system that authenticates the user.



Methods of Verification
There are two methods used in verification, which are user identification
and processed object. User identification refers to the process of
validating the user. Processed object refers to something the user has
such as identification card, security token and cell phone.
Pornography
     Pornography: can lead to criminal acts such as
exploitation of women and children can lead to sexual
addiction or perversion can develop low moral value
towards other men, women or children can erode good
religious, cultural and social beliefs and behaviour
                                Slander
      Slander: can develop into a society that disregards
honesty and truth can develop bad habit of spreading
untruths and rumours can lead to unnecessary argument
can cause people to have negative attitudes towards
another person
 Cyber  Law is needed as in the recent years, many
  concerns and issues were raised on the integrity
  and security of information, legal status of online
  transactions, privacy and confidentiality of
  information, intellectual property rights and
  security of government data placed on the Internet.
1.2.4.2 Computer crimes below


                                     Theft
         Fraud

                                             Attacks
                        Copyright
                      Infringement
Computer security means protecting our computer systems
    and the information they contain against unwanted access,
       damage, destruction or modification. Three types of
        computer security are: hardware security software
              security/data security network security


1.3.2 .1 Security Threats

                    Malicious
                    code

                                 Hacking

                                            Natural
                                            disaster

Contenu connexe

Tendances

Information and communication technology
Information and communication technologyInformation and communication technology
Information and communication technologyTamojit Das
 
Role of ICT in Teaching Learning
Role of ICT in Teaching LearningRole of ICT in Teaching Learning
Role of ICT in Teaching LearningPravinGhosekar
 
The uses of ict in our society
The uses of ict in our societyThe uses of ict in our society
The uses of ict in our societyBencelle_16
 
Technology for Teaching and Learning 1
Technology for Teaching and Learning 1Technology for Teaching and Learning 1
Technology for Teaching and Learning 1RheanneMaePrincesa
 
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxLesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxJermaine Mendoza
 
Roles of technology for teaching and learning
Roles of technology for teaching and learningRoles of technology for teaching and learning
Roles of technology for teaching and learningerwin marlon sario
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Reji Mae Sunot
 
ICT in Education ppt
ICT in Education pptICT in Education ppt
ICT in Education pptHamid Zaib
 
Introduction of multimedia in education
Introduction of multimedia in educationIntroduction of multimedia in education
Introduction of multimedia in educationUPSIcoursework
 
Digital literacy ppt
Digital literacy pptDigital literacy ppt
Digital literacy pptTreliceSmith
 

Tendances (20)

Information and communication technology
Information and communication technologyInformation and communication technology
Information and communication technology
 
Ict policies and issues
Ict policies and issuesIct policies and issues
Ict policies and issues
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Role of ICT in Teaching Learning
Role of ICT in Teaching LearningRole of ICT in Teaching Learning
Role of ICT in Teaching Learning
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
 
Ict tools
Ict tools Ict tools
Ict tools
 
The uses of ict in our society
The uses of ict in our societyThe uses of ict in our society
The uses of ict in our society
 
Impact of ICT on Society
Impact of ICT on SocietyImpact of ICT on Society
Impact of ICT on Society
 
Understanding the Basic Concept in ICT
Understanding the Basic Concept in ICTUnderstanding the Basic Concept in ICT
Understanding the Basic Concept in ICT
 
Technology in Teaching and Learning
Technology in Teaching and LearningTechnology in Teaching and Learning
Technology in Teaching and Learning
 
Technology for Teaching and Learning 1
Technology for Teaching and Learning 1Technology for Teaching and Learning 1
Technology for Teaching and Learning 1
 
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxLesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
 
Lecture 1 introduction to computing
Lecture 1 introduction to computingLecture 1 introduction to computing
Lecture 1 introduction to computing
 
Types of computer
Types of computerTypes of computer
Types of computer
 
History Of Educational Technology
History Of Educational TechnologyHistory Of Educational Technology
History Of Educational Technology
 
Roles of technology for teaching and learning
Roles of technology for teaching and learningRoles of technology for teaching and learning
Roles of technology for teaching and learning
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
 
ICT in Education ppt
ICT in Education pptICT in Education ppt
ICT in Education ppt
 
Introduction of multimedia in education
Introduction of multimedia in educationIntroduction of multimedia in education
Introduction of multimedia in education
 
Digital literacy ppt
Digital literacy pptDigital literacy ppt
Digital literacy ppt
 

En vedette

Information and communication technology:a class presentation
Information and communication technology:a class presentationInformation and communication technology:a class presentation
Information and communication technology:a class presentationSelim Reza Bappy
 
Impact of ict in education
Impact of ict in educationImpact of ict in education
Impact of ict in educationSanika Deshmukh
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)NILISSL
 
Introduction to ICT in Education
Introduction to ICT in EducationIntroduction to ICT in Education
Introduction to ICT in EducationSteve Vosloo
 
ICT in Education
ICT in EducationICT in Education
ICT in EducationOllie Bray
 
Application of information communication technology (ict)
Application of information communication technology (ict)Application of information communication technology (ict)
Application of information communication technology (ict)Kishor Satpathy
 
Advantages and disadvantages of ict
Advantages and disadvantages of ictAdvantages and disadvantages of ict
Advantages and disadvantages of ictIrfan Zulkifle
 
ICTs in the Classroom-Why Use Them
ICTs in the Classroom-Why Use ThemICTs in the Classroom-Why Use Them
ICTs in the Classroom-Why Use Themrexcris
 
Meaning of ict
Meaning of ictMeaning of ict
Meaning of ictPriya Sush
 
TPCK: Use of ICT to teach/improve the speaking of English
TPCK: Use of ICT to teach/improve the speaking of EnglishTPCK: Use of ICT to teach/improve the speaking of English
TPCK: Use of ICT to teach/improve the speaking of Englishpaula hodgson
 
Ict Examples Presentation
Ict Examples PresentationIct Examples Presentation
Ict Examples PresentationSuzie Vesper
 
Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Junaid Qadir
 
introduction of ict
introduction of ictintroduction of ict
introduction of ictCma Mohd
 
Introduction To Information And Communication Technology
Introduction To Information And Communication TechnologyIntroduction To Information And Communication Technology
Introduction To Information And Communication TechnologyPagal Bacha
 
Use of ict for effective teaching and learning
Use of ict for effective teaching and learningUse of ict for effective teaching and learning
Use of ict for effective teaching and learningAjith Janardhanan T J
 

En vedette (20)

Ict ppt
Ict pptIct ppt
Ict ppt
 
Information and communication technology:a class presentation
Information and communication technology:a class presentationInformation and communication technology:a class presentation
Information and communication technology:a class presentation
 
Impact of ict in education
Impact of ict in educationImpact of ict in education
Impact of ict in education
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)
 
Introduction to ICT in Education
Introduction to ICT in EducationIntroduction to ICT in Education
Introduction to ICT in Education
 
ICT in Education
ICT in EducationICT in Education
ICT in Education
 
Application of information communication technology (ict)
Application of information communication technology (ict)Application of information communication technology (ict)
Application of information communication technology (ict)
 
71 ICT Ideas in Education
71 ICT Ideas in Education71 ICT Ideas in Education
71 ICT Ideas in Education
 
Advantages and disadvantages of ict
Advantages and disadvantages of ictAdvantages and disadvantages of ict
Advantages and disadvantages of ict
 
ICTs in the Classroom-Why Use Them
ICTs in the Classroom-Why Use ThemICTs in the Classroom-Why Use Them
ICTs in the Classroom-Why Use Them
 
Meaning of ict
Meaning of ictMeaning of ict
Meaning of ict
 
Probability and statistics
Probability and statisticsProbability and statistics
Probability and statistics
 
TPCK: Use of ICT to teach/improve the speaking of English
TPCK: Use of ICT to teach/improve the speaking of EnglishTPCK: Use of ICT to teach/improve the speaking of English
TPCK: Use of ICT to teach/improve the speaking of English
 
Ict Examples Presentation
Ict Examples PresentationIct Examples Presentation
Ict Examples Presentation
 
Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1
 
Introduction of ICT
Introduction of ICTIntroduction of ICT
Introduction of ICT
 
introduction of ict
introduction of ictintroduction of ict
introduction of ict
 
Introduction of ICT
Introduction of ICTIntroduction of ICT
Introduction of ICT
 
Introduction To Information And Communication Technology
Introduction To Information And Communication TechnologyIntroduction To Information And Communication Technology
Introduction To Information And Communication Technology
 
Use of ict for effective teaching and learning
Use of ict for effective teaching and learningUse of ict for effective teaching and learning
Use of ict for effective teaching and learning
 

Similaire à Chapter 1-introduction to ict

Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1ikmalsham
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impactsBeing Aabis
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxeyesred813
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfmt5854804210
 
a brief introduction of ict and its components
a brief introduction of ict and its componentsa brief introduction of ict and its components
a brief introduction of ict and its componentsGloriaRamos83
 
Information and Communication Technology.pptx
Information and Communication Technology.pptxInformation and Communication Technology.pptx
Information and Communication Technology.pptxDigitalizedNepal
 

Similaire à Chapter 1-introduction to ict (20)

Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ict
IctIct
Ict
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
devansh .pdf
devansh .pdfdevansh .pdf
devansh .pdf
 
devansh .pdf
devansh .pdfdevansh .pdf
devansh .pdf
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impacts
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptx
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
 
a brief introduction of ict and its components
a brief introduction of ict and its componentsa brief introduction of ict and its components
a brief introduction of ict and its components
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Information and Communication Technology.pptx
Information and Communication Technology.pptxInformation and Communication Technology.pptx
Information and Communication Technology.pptx
 

Plus de Aten Kecik

Question chapter 1
Question chapter 1Question chapter 1
Question chapter 1Aten Kecik
 
Question chapter 4
Question chapter 4Question chapter 4
Question chapter 4Aten Kecik
 
Soalan chapter 2
Soalan chapter 2Soalan chapter 2
Soalan chapter 2Aten Kecik
 
Soalan chapter 5
Soalan chapter 5Soalan chapter 5
Soalan chapter 5Aten Kecik
 
2.latihan pepejal
2.latihan pepejal2.latihan pepejal
2.latihan pepejalAten Kecik
 
1.latihan wang
1.latihan wang1.latihan wang
1.latihan wangAten Kecik
 
2.nota pepejal
2.nota pepejal2.nota pepejal
2.nota pepejalAten Kecik
 
Chapter 6-information system
Chapter 6-information systemChapter 6-information system
Chapter 6-information systemAten Kecik
 
Chapter 4-multimedia
Chapter 4-multimediaChapter 4-multimedia
Chapter 4-multimediaAten Kecik
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer networkAten Kecik
 
Chapter 5-programming
Chapter 5-programmingChapter 5-programming
Chapter 5-programmingAten Kecik
 
Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer systemAten Kecik
 

Plus de Aten Kecik (15)

Soalan bab 6
Soalan bab 6Soalan bab 6
Soalan bab 6
 
Soalan bab 3
Soalan bab 3Soalan bab 3
Soalan bab 3
 
Question chapter 1
Question chapter 1Question chapter 1
Question chapter 1
 
Question chapter 4
Question chapter 4Question chapter 4
Question chapter 4
 
Soalan chapter 2
Soalan chapter 2Soalan chapter 2
Soalan chapter 2
 
Soalan chapter 5
Soalan chapter 5Soalan chapter 5
Soalan chapter 5
 
2.latihan pepejal
2.latihan pepejal2.latihan pepejal
2.latihan pepejal
 
1.latihan wang
1.latihan wang1.latihan wang
1.latihan wang
 
1.nota wang
1.nota wang1.nota wang
1.nota wang
 
2.nota pepejal
2.nota pepejal2.nota pepejal
2.nota pepejal
 
Chapter 6-information system
Chapter 6-information systemChapter 6-information system
Chapter 6-information system
 
Chapter 4-multimedia
Chapter 4-multimediaChapter 4-multimedia
Chapter 4-multimedia
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer network
 
Chapter 5-programming
Chapter 5-programmingChapter 5-programming
Chapter 5-programming
 
Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer system
 

Chapter 1-introduction to ict

  • 1. INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY
  • 2. 1.1.1.1 Define ICT. ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.
  • 3. INFORMATION Information refers to the knowledge obtained from reading, investigation, study or research. The tools to transmit information are the telephone, television and radio. Information is knowledge and helps us to fulfill our daily tasks.  COMMUNICATION Communication is an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Communication is important in order to gain knowledge.  TECHNOLOGY Technology is the use of scientific knowledge, experience and resources to create processes products that fulfill human needs. Technology is vital in communication
  • 4. 1.1.1.2 Evolution of computers. COMPUTER GENERATIONS  First Generation (1940-1956)  SECOND GENERATION (1956-1963)  THIRD GENERATION (1964-1971)  FOURTH GENERATION (1971- PRESENT)   FIFTH GENERATION (PRESENT & BEYOND)  NEW ERA COMPUTER
  • 5. 1.1.2.1 The usage of ICT in everyday life ◊ EDUCATION In education, teachers, students, researchers and school administrators benefits from the usage of ICT. ◊ BANKING In the banking, customers, businessman & bank administrator benefits from the usage of ICT. ◊ INDUSTRY Computers are used to facilitate production planning and control systems, to support chain management and to help in product design in the industrial sector. In the industrial sector, workers, researchers and administrator benefits from the usage of ICT. ◊ E-COMMERCE E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient and faster. For this application, computers, Internet and shared software are needed. In the e-commerce sector, customers, suppliers and employees benefits from the usage of ICT.
  • 6. 1.1.2.2 Differences between computerised and non-computerised systems. Computerised Non-Computerised more interesting & interactive depends on teachers & textbook experiences all transactions are done by banking was done manually computers Computers and Production was slow because telecommunications industry everything was done depended on became very popular and profitable human labour. since production can be increased through an all day operation. E-commerce plays an important Trading was made using the barter role in the economic scene. It system and it was then later includes distribution, buying, developed into currency. selling and servicing products that are done electronically
  • 7. FASTER COMMUNICATION SPEED SOCIAL LOWER PROBLEMS COMMUNICATION COST impact of ICT on society BORDERLESS RELIABLE MODE OF COMMUNICATION COMMUNICATION EFFECTIVE PAPERLESS SHARING OF ENVIRONMENT INFORMATION
  • 8. COMPUTER ETHICS Computer ethics is a system of moral standards or values used as a guideline for computer users. It is needed to stop the current technology products from being exploited. Ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. Code of ethics in computing means moral guidelines to refer to when using the computer and the Internet.
  • 9. INTELLECTUAL PROPERTY Intellectual property refers to any product of human intellect that is unique and has value in the market place. This covers ideas, inventions, unique name, computer program codes and many more. PRIVACY Privacy in IT refers to data and information privacy. In general, data include texts, numbers, sounds, images and video. Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them. CYBER LAW Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
  • 10. ETHICS LAW  Guideline: As a guideline to  Control: As a rule to control computer users. computer users.  Moral Standards: Ethical behaviour  Judicial Standards: Law is judged is judged by moral standards. by judicial standards.  No Punishments: No punishment for  Must Follow: Computer users must anyone who violates ethics. follow the regulations and law.  Free To Follow: Computer users are  Punishments: Penalties, free to follow or ignore the code of imprisonments and other punishments ethics. for those who break the law.  Immoral: Not honouring computer  Depends On Country: Depends on ethics means ignoring the moral country and state where the crime is elements (immoral). committed.  Universals: Universal, can be  Prevent Misusing Of Computers: To applied anywhere, all over the world prevent misuse of computers.  Produce Ethical Computer Users: To  Crime: Not honouring the law produce ethical computer users means committing a crime.
  • 11. Intellectual property laws are needed to establish and safeguard the intellectual property which refers to works created by inventors, authors and artists. It is also needed as businesses today continue to expand globally. There are four types of Intellectual Property protection. They are patents for invention, trademarks for brand identity, designs for product appearance and copyright for material.
  • 12. •he privacy laws in Malaysia emphasises on the Privacy following: •Security Services to review the security policy Security Management to protect the resources law Security Mechanism to implement the required security services Security Objects, the important entities within the system environment Utilities •Example: anti-spam program, firewall, anti- spyware and antivirus. software
  • 13. Methods of Authentication There are two commonly used authentication methods, which are biometric device and callback system. Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition and Signature Verification. Callback system refers to the checking system that authenticates the user. Methods of Verification There are two methods used in verification, which are user identification and processed object. User identification refers to the process of validating the user. Processed object refers to something the user has such as identification card, security token and cell phone.
  • 14. Pornography Pornography: can lead to criminal acts such as exploitation of women and children can lead to sexual addiction or perversion can develop low moral value towards other men, women or children can erode good religious, cultural and social beliefs and behaviour Slander Slander: can develop into a society that disregards honesty and truth can develop bad habit of spreading untruths and rumours can lead to unnecessary argument can cause people to have negative attitudes towards another person
  • 15.  Cyber Law is needed as in the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet. 1.2.4.2 Computer crimes below Theft Fraud Attacks Copyright Infringement
  • 16. Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification. Three types of computer security are: hardware security software security/data security network security 1.3.2 .1 Security Threats Malicious code Hacking Natural disaster