G4.2 - Trends and Issues in ICT

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

Information Sheet 4.

2-1

Trends and Issues in ICT

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:

a. Discuss the different trends and issues in ICT.

b. Use the tips to avoid the different issues in ICT.

c. Explain the emerging trends and issues in ICT.

Information and Communication Technology (ICT)

- a broad range of technology resources that used for transmitting, storing, sharing, and

exchanging of information.

TRENDS AND ISSUES IN ICT

What is Trend?

- A trend is a shift or development toward something new or different, which changes

ahead of time.

What is Issue?

- are the issues that require resolution. These are extremely delicate subjects.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
TRENDS IN ICT

1. Social Media

- used by people to connect and interact with their friends, family, and other

communities. Also, exchanging of ideas and information in virtual and networks.

Additionally, used to describe a group of websites and services that emphasize

collaboration, sharing of contents, communication, and engagement.

Six Types of Social Media

Social Networks

- these are the apps that allow you to interact with other individuals with a common

interests and backgrounds.

Bookmarking Sites

- these are the websites that let you to arrange and manage of links to various sites

and resources. You could make tag on most of these websites so that other users

can identify them easily and share them.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
Social News

- these websites allow users to post their own reports or articles to other news

sources and allowing users to leave their opinions or comments, which can also be

evaluated.

Media Sharing

- these websites you may post and share media assets, such as pictures, music, and

videos. The majority of these websites include extra social features like user profiles

and the ability to like and comment.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
Microblogging

- these are websites that highlight short user updates. These updates will be available

to those who have subscribed to the user.

Blogs and Forum

- users can publish their content on these websites and can leave comments or

opinions. Additionally, forums are usually a part of a certain website or web service.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
2. Mobile Technologies

- over the past few years, tablets and smartphones have become much more popular.

This is primarily attributable to the gadget's capacity to do functions that were

previously only found in personal computers. Some of these gadgets can connect to

high-speed internet. The newest mobile handsets employ 4G Networking (LTE),

which is the fastest mobile network available right now. Additionally, mobile devices

run various operating systems.

Mobile Devices:

iOS - the operating system for the iPhone, iPad, and other Apple mobile devices is

called Apple iOS. Apple iOS, which is based on Mac OS, the operating system that

powers Apple's lineup of desktop and laptop computers, is made to make networking

between various Apple products simple and easy.

Android - the Android operating system has been available for mobile devices for

almost 15 years. It is mostly used as the default operating system on phones and

tablets around the globe. In addition, Windows 11 and Chrome OS are among the

other operating systems that directly accept Android applications.

Blackberry OS - the exclusive mobile operating system known as BlackBerry OS

was created especially for BlackBerry smartphones made by Research In Motion

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
(RIM). On Blackberry variant phones, such as the BlackBerry Bold, Curve, Pearl, and

Storm series, the BlackBerry OS is installed.

Window Phone OS - microsoft created the exclusive mobile operating system known

as Windows Phone. Metro UI, the design language that Windows Phone initially

debuted, was eventually replaced with just Modern.

Symbian - early in the new millennium, Symbian, a mobile operating system (OS) for

mobile devices, gained popularity. It was created by Symbian Ltd., an alliance by

Nokia, Motorola, and Ericsson, three of the biggest producers of mobile phones.

WebOS - an open source Linux-based operating system for TVs and appliances by

LG is also referred to as a Web OS, as is any operating system created specifically for

Web use. See ChromeOS. Web technologies including JavaScript, CSS, and HTML5

are supported by webOS, a touchscreen operating system that Palm developed and

debuted with the Palm Pre in 2009.

Windows Mobile - Microsoft's Windows Mobile operating system was designed

particularly for Pocket PCs and cellphones. It was first made available with the Pocket

PC 2000 operating system, using the Windows CE kernel as its foundation. Windows

Mobile offered capabilities for customization and unrestricted program development

by Microsoft, along with basic applications created using the Microsoft Windows

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
API. The Windows Marketplace for Mobile offered applications for the software for

purchase.

3. Assistive Media

- was a nonprofit organization that is created to benefit those with vision and reading

difficulties. The user is used to read using an audio recording database.

4. Artificial Intelligence (AI)

- abbreviated to AI, is a space of computer science that seeks to provide software the

ability to analyze its environment using models of machine learning that recognizes

patterns and established rules and search algorithms, and formulate choices based on

those analyses. It is a system that can comprehend, learn, predict, and react to a

situation in a way that is considered intelligent. These systems could be used to

control characters that are not players in a computer game, a robot in the real world,

or a tool with data analysis and prediction.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
5. Robotics and Automation

- the engineering disciplines of robotics and automation are concerned with the

creation, operation, and maintenance of machines, or robots, that carry out tasks that

are typically completed by humans. They are utilized to improve productivity and

safety in hazardous, time-consuming, or repetitive jobs.

6. Metaverse

- the term "metaverse" describes a virtual reality environment where users can

communicate with each other and a computer-generated world. Users can

communicate in real time with one other and the surroundings in the metaverse. They

are also capable of creating their own worlds, things, and experiences.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
7. Blockchain

- is a kind of distributed ledger technology that allows several stakeholders to approve

and confirm transactions by storing data across numerous platforms. Its potential

applications are well beyond cryptocurrency like Bitcoin, for which it is most well-

known as the underlying technology.

8. Spatial Computing

- one kind of computing technology called spatial computing makes use of the spaces

where people move and behave. It allows computers to see and react to human

behavior by integrating them with humans in a physical setting.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
9. 5G Networks

- Fifth-generation networks, or 5G networks, are the newest wireless technology that

allows for real-time interaction and communication. This is especially crucial for

applications such as gaming, remote surgery, and driverless vehicles.

KEY FEATURES OF 5G NETWORKS:

1. Faster Speeds

2. Lower Latency

3. Increased Capacity

4. Enhanced Connectivity

5. Support for New Technologies

ISSUES IN ICT

LEGAL AND ETHICAL ISSUES

Copyright

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
- refers to the ownership of the whole right to decide how and to what degree one's

original intellectual work may be used. Since the original work has been protected by

copyright, it cannot be taken or duplicated without the owner's consent.

Copyright Infringement/Violation

- when someone uses significant parts of a work without permission and without

establishing fair use of them, or copies a work protected by copyright and passes it off

as their own, that is considered copyright infringement. You must demonstrate both

the work's ownership and its suitability for copyright protection in order to establish a

copyright violation. This indicates that the necessary degree of uniqueness is present

in your work. The validity of the copyright is demonstrated if you register and receive

your certificate of copyright within five years after producing the work.

Demonstrating that your work has been copied is the second requirement. When a

work is made accessible for use without the owner of the copyright's consent, it is said

that they are "in the public domain" is that their copyrights have run out.

Plagiarism

- means "to steal and pass off ideas or words of another as one's own." It occurs when

an individual copies somebody's work and pretend that it his/her creation.

Hacking

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
- the act of accessing digital devices and networks by gaining unauthorized access to a

user's account or computer system is the most common definition of hacking.

Although hacking isn't always harmful, cybercriminals typically use it in connection

with illegal conduct and data theft.

SOCIAL ISSUES

Cybercrime

- criminal action that involves the intentional use or targeting of a computer, computer

network, or networked device is known as cybercrime. Hackers or cybercriminals

looking to profit from their crimes commit the majority of cybercrime. On certain

occasions, though, cybercrime seeks to harm networks or computers for purposes

other than financial gain. They could be personal or political.

- can be committed by one person or by an organization. Some cybercriminals are

quite proficient technically, well-organized, and employ cutting-edge methods. Some

are not very experienced hackers.

TYPES OF CYBERCRIME:

1. Internet fraud - the term "internet fraud" refers to any kind of fraud scheme that

presents bogus requests to potential victims through email, websites, chat rooms, or

message boards; conducts fraudulent transactions; or transfers the proceeds of fraud to

financial institutions or other scheme participants.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
2. Identity fraud - where personal information is stolen and used.

Cyberbullying

- bullying using digital platforms, such as computers, tablets, and cell phones, is

known as cyberbullying. Cyberbullying can happen online in social media, forums, or

gaming where users can read, interact with, or exchange content. It can also happen

through SMS, text messages, and applications. Sending, publishing, or disseminating

hurtful, malicious, or malicious content about another person is known as

cyberbullying. It may involve disclosing private or intimate information about another

individual in a way that makes them feel embarrassed or degraded. Cyberbullying can

often cross the line into illegal or criminal activity.

Online Harassment

- the use of information and communication technology by an individual or group to

intentionally injure another person on a regular basis is known as online harassment.

Threats, shame, or disgrace may be part of this in an online context.

TIPS TO AVOID THESE ISSUES

Copyright and Copyright Infringement Violation

1. Proper Licensing and Permissions

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
- before using copyrighted material, make sure you have the necessary permissions or

licenses. This may involve contacting the original content owners, purchasing a

license, or obtaining permission through a Creative Commons license.

2. Fair use

- a legal principle known as fair use permits the restricted use of copyrighted content

for specific uses, like commentary, news reporting, and teaching. Take into account

the reason for your use, the type of copyrighted work, the quantity used, and the

possible effect on the original work's market value to determine whether your use of

copyrighted material qualifies as fair dealing.

3. Citation and Attribution

- when use content protected by copyright, always give due credit to the original

author.

Plagiarism

1. Paraphrasing or quoting from your sources (by using a paraphrasing tool and

adding your own ideas).

2. Crediting the original author in an in-text citation and in your reference list.

3. Using a plagiarism checker before you submit.

4. Use generative AI tools responsibly (outputs may be detected by an AI detector

may be able to identify your results.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
Hacking

1. Regarding attachments and links, use carefully

- don’t Click the link or attachment if you have any doubts about the source.

2. Stop or turn Off everything that is not necessary

- certain phone functions can be used by hackers to access your data, location, or

connection. Therefore, only turn on your GPS, wireless network, and geo tracking

when necessary rather than leaving them on all the time.

Cybercrime

1. Make secure passwords

- avoid using the same passwords across many websites, and make sure you change

them frequently. Give them complexity. This requires the use of a minimum of ten

different letters, numbers, and symbols. Your passwords may be kept secure with the

use of a password management program.

2. Keep your software update

- when it comes to your operating systems and internet security software, this is quite

crucial. Known vulnerabilities in software, or exploits, are a common tool used by

cybercriminals to access your system. By fixing such vulnerabilities and exploits, you

may reduce the likelihood that you'll be the target of cybercrime.

3. Manage your social media settings

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
- safeguard your personal and confidential data. It is best to post as little information

publicly as possible since social engineering cybercriminals may frequently obtain

your personal information with only a few data points. For example, posting the name

of your pet or disclosing your mother's maiden name might expose the answers to two

often asked security questions.

4. Take measures to protect yourself against identity theft

- identity theft is when someone fraudulently or deceptively gets your personal

information, usually with the intention of making money. How? For example, you

may be conned into divulging personal information online, or someone could

intercept your mail and use it to access account information. It is crucial to protect

your personal information because of this. Virtual private networks, or VPNs, can

also aid in safeguarding the information you send and receive online, particularly

while using public Wi-Fi to access the internet.

Cyberbullying

1. Optimize your privacy settings

- look into the steps you may take to protect private material on the websites you visit.

You may change your privacy settings on Facebook and other social networking sites

to limit who can view your posts and personal information to those you want. It's

crucial to regularly check these privacy settings since websites occasionally alter their

rules.

2. Think before you post

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
- never forget that everyone may access the internet. Nothing you post online can ever

be taken down. Don't say anything online if you wouldn't say it in front of a group of

strangers. There may be unintended effects even if you send someone private or

humiliating information about yourself over email.

3. Keep personal information personal

- don't post any personally identifiable information online, such as your address,

phone number, school, credit card number, etc. There's a reason password is used;

exposing them to others is similar to giving out duplicates of your home key to both

acquaintances and total strangers. Your parents alone should be the only people who

know your passwords if they do not already know them.

Online Harassment

1. Check Your Privacy Settings

- make sure your social media accounts have stringent privacy settings to prevent

harassment in the future. Make sure to keep your personal information private by

setting your accounts on social media sites like Facebook and Twitter to "friends

only" or "private." Posting your home address, phone number, name from school or

work, or any other private information about yourself is not permitted.

2. Report Threats/Dangers

- inform the police about any threats of physical harm. Report anything to the

authorities right once if someone phones or contacts your place of work, distributes

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
explicit photos or videos of you, provides personal information, or threatens your

safety.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
Self-Check: 4.2-1

Multiple Choice: Read and analyze the statement carefully. Choose the best answer

and write the letter only in your answer sheet.

1. It is the effective use of many technologies to complete a task.

a. Social Media

b. Spatial Computing

c. Convergence

d. Assistive Media

2. Type of social media that allow you to interact with other individuals with a

common interests and backgrounds.

a. Media Sharing

b. Microblogging

c. Social Networks

d. Social News

3. One kind of computing technology that makes use of the spaces where people

move and behave.

a. 5G Networks

b. Metaverse

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
c. Spatial Computing

d. Robotics and Automation

4. Refers to the ownership of the whole right to decide how and to what degree one's

original intellectual work may be used.

a. Plagiarism

b. Hacking

c. Copyright

d. Copyright Infringement/Violation

5. Which mobile device network is now the fastest?

a. Networking over 3G

b. LTE 4G networking

c. Networking with 5G

d. Cutting-Edge Communications

6. How to define plagiarism?

a. Unauthorized entry into networks and digital devices

b. Producing unique material without giving due credit

c. Claiming credit for someone else's work and passing it off as your own

d. Using computer networks to commit crimes

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
7. How can you prevent plagiarism before handing in any work?

a. Make use of generative AI technologies without plagiarism detection.

b. Adapt text straight from websites.

c. Give proper credit and citation to all sources.

d. Turn in work without verifying that it is original.

8. What is the main objective of fair usage since it relates to copyright law?

a. To limit how copyrighted content is used.

b. To allow unrestricted usage of copyrighted content.

c. To allow restricted use of copyrighted material for specified uses.

d. Completely forbid using copyrighted content.

9. Which safety phase restricts access to location data and personal information to

help prevent hacking?

a. Make sure your phone is on at all times.

b. When not in use, turn off your wi-fi network, GPS, and geo tracking.

c. Select every attachment and link coming from reputable sites.

d. Never update software or programs.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
10. It is a system that can comprehend, learn, predict, and react to a situation in a way

that is considered intelligent.

a. Artificial Intelligence (AI)

b. Robotics and Automation

c. Metaverse

d. Blockchain

11. It describes a virtual reality environment where users can communicate with each

other and a computer-generated world.

a. Artificial Intelligence (AI)

b. Robotics and Automation

c. Metaverse

d. Blockchain

12. A criminal action that involves the intentional use or targeting of a computer,

computer network, or networked device.

a. Cyberbullying

b. Hacking

c. Cybercrime

d. Harassment

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
13. The following are social issues in ICT, except:

a. Cyberbullying

b. Hacking

c. Cybercrime

d. Harassment

14. The following are the tips to avoid cybercrime, except:

a. Make secure password

b. Keep your software not updated

c. Manage your social media setting

d. Take measures to protect yourself against identity theft

15. These are the types of Social Media, except?

a. Blockchain

b. Blogs and Forum

c. Social Networks

d. Social News

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE
ANSWER KEY: 4.2-1

1. C.

2. C.

3. C.

4. C.

5. B.

6. C.

7. C.

8. C.

9. B.

10. A.

11. C.

12. C.

13. B.

14. B.

15. A.

Teaching ICT as an Developed by: Date Developed:


Exploratory ANGELES, SHELLA
MONTEMAYOR, ANGELICA MARIE March 2024
SALAZAR, JADE

You might also like