SlideShare a Scribd company logo
2
Most read
3
Most read
6
Most read
INFORMATION AND COMMUNICATION
       TECHNOLOGY AND SOCIETY
   1.1.1.1 Define ICT.

         ICT is the technology required for information
    processing, in particular, the use of electronic computers,
    communication devices and software applications to
    convert, store, protect, process, transmit and retrieve
    information from anywhere, anytime.
   INFORMATION
            Information refers to the knowledge obtained from reading,
    investigation, study or research. The tools to transmit information are the
    telephone, television and radio. Information is knowledge and helps us to
    fulfill our daily tasks.
   COMMUNICATION
          Communication is an act of transmitting messages. It is a process
    whereby information is exchanged between individuals using symbols, signs
    or verbal interactions. Communication is important in order to gain
    knowledge.
   TECHNOLOGY
          Technology is the use of scientific knowledge, experience and
    resources to create processes products that fulfill human needs.
    Technology is vital in communication
   1.1.1.2 Evolution of computers.
COMPUTER GENERATIONS

   First Generation (1940-1956)

   SECOND GENERATION (1956-1963)

   THIRD GENERATION (1964-1971)

   FOURTH GENERATION (1971- PRESENT)

   FIFTH GENERATION (PRESENT & BEYOND)

   NEW ERA COMPUTER
   1.1.2.1 The usage of ICT in everyday life

◊ EDUCATION
              In education, teachers, students, researchers and school administrators benefits from the usage of
    ICT.


◊   BANKING
             In the banking, customers, businessman & bank administrator benefits from the usage of ICT.
◊   INDUSTRY

            Computers are used to facilitate production planning and control systems, to support chain
    management and to help in product design in the industrial sector. In the industrial sector, workers, researchers
    and administrator benefits from the usage of ICT.
◊ E-COMMERCE

             E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient
    and faster. For this application, computers, Internet and shared software are needed. In the e-commerce sector,
    customers, suppliers and employees benefits from the usage of ICT.
1.1.2.2 Differences between computerised and non-computerised
  systems.
         Computerised                          Non-Computerised
         more interesting & interactive       depends on teachers & textbook
         experiences

         all transactions are done by         banking was done manually
         computers

         Computers and                        Production was slow because
         telecommunications industry           everything was done depended on
         became very popular and profitable    human labour.
         since production can be increased
         through an all day operation.
         E-commerce plays an important        Trading was made using the barter
         role in the economic scene. It        system and it was then later
         includes distribution, buying,        developed into currency.
         selling and servicing products that
         are done electronically
FASTER
                COMMUNICATION
                   SPEED

   SOCIAL                              LOWER
  PROBLEMS                          COMMUNICATION
                                        COST



                   impact of
                    ICT on
                    society
 BORDERLESS                        RELIABLE MODE OF
COMMUNICATION                       COMMUNICATION




                                 EFFECTIVE
         PAPERLESS
                                SHARING OF
        ENVIRONMENT
                               INFORMATION
COMPUTER ETHICS
Computer ethics is a system of moral standards or
  values used as a guideline for computer users. It is
  needed to stop the current technology products from
  being exploited.

Ethics is a moral philosophy where a person makes a
  specific moral choice and sticks to it. Code of ethics
  in computing means moral guidelines to refer to when
  using the computer and the Internet.
INTELLECTUAL PROPERTY

Intellectual property refers to any product of human intellect
  that is unique and has value in the market place. This covers
  ideas, inventions, unique name, computer program codes and
  many more.

PRIVACY
Privacy in IT refers to data and information privacy. In general,
  data include texts, numbers, sounds, images and video.
  Information privacy is described as the rights of individuals
  and companies to deny or restrict the collection and use of
  information about them.

CYBER LAW
Cyber law refers to any laws relating to protecting the Internet
  and other online communication technologies.
ETHICS                             LAW
 Guideline: As a guideline to          Control: As a rule to control
computer users.                        computer users.
 Moral Standards: Ethical behaviour    Judicial Standards: Law is judged
is judged by moral standards.          by judicial standards.
 No Punishments: No punishment for     Must Follow: Computer users must
anyone who violates ethics.            follow the regulations and law.
 Free To Follow: Computer users are    Punishments: Penalties,
free to follow or ignore the code of   imprisonments and other punishments
ethics.                                for those who break the law.
 Immoral: Not honouring computer       Depends On Country: Depends on
ethics means ignoring the moral        country and state where the crime is
elements (immoral).                    committed.
 Universals: Universal, can be         Prevent Misusing Of Computers: To
applied anywhere, all over the world   prevent misuse of computers.
 Produce Ethical Computer Users: To    Crime: Not honouring the law
produce ethical computer users         means committing a crime.
Intellectual property laws are needed to
 establish and safeguard the intellectual
 property which refers to works created
  by inventors, authors and artists. It is
     also needed as businesses today
  continue to expand globally. There are
    four types of Intellectual Property
     protection. They are patents for
invention, trademarks for brand identity,
   designs for product appearance and
          copyright for material.
•he privacy laws in Malaysia emphasises on the

Privacy
             following:
            •Security Services to review the security policy
             Security Management to protect the resources
  law        Security Mechanism to implement the required
             security services Security Objects, the important
             entities within the system environment




Utilities   •Example: anti-spam program, firewall, anti-
             spyware and antivirus.
software
Methods of Authentication
  There are two commonly used authentication methods, which are biometric
    device and callback system. Biometric device is a device that translates
   personal characteristics into a digital code that is compared with a digital
      code stored in the database. Biometric devices include Fingerprint
    Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal
   Scanning, Voice Recognition and Signature Verification. Callback system
          refers to the checking system that authenticates the user.



Methods of Verification
There are two methods used in verification, which are user identification
and processed object. User identification refers to the process of
validating the user. Processed object refers to something the user has
such as identification card, security token and cell phone.
Pornography
     Pornography: can lead to criminal acts such as
exploitation of women and children can lead to sexual
addiction or perversion can develop low moral value
towards other men, women or children can erode good
religious, cultural and social beliefs and behaviour
                                Slander
      Slander: can develop into a society that disregards
honesty and truth can develop bad habit of spreading
untruths and rumours can lead to unnecessary argument
can cause people to have negative attitudes towards
another person
 Cyber  Law is needed as in the recent years, many
  concerns and issues were raised on the integrity
  and security of information, legal status of online
  transactions, privacy and confidentiality of
  information, intellectual property rights and
  security of government data placed on the Internet.
1.2.4.2 Computer crimes below


                                     Theft
         Fraud

                                             Attacks
                        Copyright
                      Infringement
Computer security means protecting our computer systems
    and the information they contain against unwanted access,
       damage, destruction or modification. Three types of
        computer security are: hardware security software
              security/data security network security


1.3.2 .1 Security Threats

                    Malicious
                    code

                                 Hacking

                                            Natural
                                            disaster

More Related Content

PPT
INTRODUCTION TO ICT
PPTX
Lesson 1: Introduction to Information and Communication Technology
PPTX
Introduction to ict
PPTX
Information communication technology
PPTX
Information and communication technology:a class presentation
PPTX
Uses of ICT in daily lives.pptx
DOC
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
PPTX
Information & communication Technology
INTRODUCTION TO ICT
Lesson 1: Introduction to Information and Communication Technology
Introduction to ict
Information communication technology
Information and communication technology:a class presentation
Uses of ICT in daily lives.pptx
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
Information & communication Technology

What's hot (20)

PPTX
Social & professional issues in IT
PPTX
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
PPTX
World Wide Web and Internet
PPTX
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
PPT
Usage Of Ict In Every Day Life
PPTX
Information and communication technology
PPTX
Lecture 1 introduction to computing
PPT
Introduction to computer programming
PPTX
Digital citizenship powerpoint
PPTX
01_Introduction to living in the it era
PPTX
information and communication technology
PPT
Ethical Issues In ICT
PPTX
Impact of ICT on Society
PPTX
Parts of System Unit
PPT
Ict tools
PPTX
Information and Communication Technologies (ICTs)
PPTX
Unit 6: Information Communication Technology (ICT)
DOCX
Demonstration lesson-plan-in-ict grade 11
PPTX
Introduction to ICT - lecture 1
PPTX
Communication technology
Social & professional issues in IT
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
World Wide Web and Internet
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Usage Of Ict In Every Day Life
Information and communication technology
Lecture 1 introduction to computing
Introduction to computer programming
Digital citizenship powerpoint
01_Introduction to living in the it era
information and communication technology
Ethical Issues In ICT
Impact of ICT on Society
Parts of System Unit
Ict tools
Information and Communication Technologies (ICTs)
Unit 6: Information Communication Technology (ICT)
Demonstration lesson-plan-in-ict grade 11
Introduction to ICT - lecture 1
Communication technology
Ad

Viewers also liked (20)

PPTX
PPTX
ICT in Education ppt
PPTX
Impact of ict in education
PPT
Information communication technology (ict)
PPTX
Introduction to ICT in Education
PPT
ICT in Education
PPT
Application of information communication technology (ict)
PPT
71 ICT Ideas in Education
DOC
Advantages and disadvantages of ict
PPS
ICTs in the Classroom-Why Use Them
PPTX
Meaning of ict
PPT
Probability and statistics
PPT
TPCK: Use of ICT to teach/improve the speaking of English
PPT
Ict Examples Presentation
PDF
Fundamentals of ICT - Lecture 1
PPTX
Introduction of ICT
PPT
introduction of ict
PDF
Introduction of ICT
PPT
Introduction To Information And Communication Technology
PPT
Use of ict for effective teaching and learning
ICT in Education ppt
Impact of ict in education
Information communication technology (ict)
Introduction to ICT in Education
ICT in Education
Application of information communication technology (ict)
71 ICT Ideas in Education
Advantages and disadvantages of ict
ICTs in the Classroom-Why Use Them
Meaning of ict
Probability and statistics
TPCK: Use of ICT to teach/improve the speaking of English
Ict Examples Presentation
Fundamentals of ICT - Lecture 1
Introduction of ICT
introduction of ict
Introduction of ICT
Introduction To Information And Communication Technology
Use of ict for effective teaching and learning
Ad

Similar to Chapter 1-introduction to ict (20)

PPTX
Chapter 1
PPTX
Chapter 1
PPT
Computer Ethics and Legal Issues
PDF
Jawapan bab 1
PPSX
1 ICT in Society
PPTX
Chapter 1
PPTX
Chapter 1
PPT
Ethics in using computer
PDF
Nota Padat ICT SPM - Form 4
PPT
Ict form 4 chapter 1(answer)
PPTX
Cyber law by pravin ghosekar
PPTX
Working with ict ethical social and legal issues
PPTX
Computer ethics cyber security and technology of it
PPTX
Computer ethics
PPTX
Computer ethics
DOCX
Worksheet complete set 180111
PPTX
computer ethics slides
PDF
Nota Padat ICT SPM
PPTX
COMPUTER ETHICS
Chapter 1
Chapter 1
Computer Ethics and Legal Issues
Jawapan bab 1
1 ICT in Society
Chapter 1
Chapter 1
Ethics in using computer
Nota Padat ICT SPM - Form 4
Ict form 4 chapter 1(answer)
Cyber law by pravin ghosekar
Working with ict ethical social and legal issues
Computer ethics cyber security and technology of it
Computer ethics
Computer ethics
Worksheet complete set 180111
computer ethics slides
Nota Padat ICT SPM
COMPUTER ETHICS

More from Aten Kecik (15)

PPTX
Soalan bab 6
PPTX
Soalan bab 3
PPTX
Question chapter 1
PPTX
Question chapter 4
PPTX
Soalan chapter 2
PPTX
Soalan chapter 5
PPTX
2.latihan pepejal
PPTX
1.latihan wang
PPTX
1.nota wang
PPTX
2.nota pepejal
PPTX
Chapter 6-information system
PPTX
Chapter 4-multimedia
PPTX
Bab3-computer network
PPTX
Chapter 5-programming
PPTX
Chapter 2 computer system
Soalan bab 6
Soalan bab 3
Question chapter 1
Question chapter 4
Soalan chapter 2
Soalan chapter 5
2.latihan pepejal
1.latihan wang
1.nota wang
2.nota pepejal
Chapter 6-information system
Chapter 4-multimedia
Bab3-computer network
Chapter 5-programming
Chapter 2 computer system

Chapter 1-introduction to ict

  • 1. INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY
  • 2. 1.1.1.1 Define ICT. ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.
  • 3. INFORMATION Information refers to the knowledge obtained from reading, investigation, study or research. The tools to transmit information are the telephone, television and radio. Information is knowledge and helps us to fulfill our daily tasks.  COMMUNICATION Communication is an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Communication is important in order to gain knowledge.  TECHNOLOGY Technology is the use of scientific knowledge, experience and resources to create processes products that fulfill human needs. Technology is vital in communication
  • 4. 1.1.1.2 Evolution of computers. COMPUTER GENERATIONS  First Generation (1940-1956)  SECOND GENERATION (1956-1963)  THIRD GENERATION (1964-1971)  FOURTH GENERATION (1971- PRESENT)   FIFTH GENERATION (PRESENT & BEYOND)  NEW ERA COMPUTER
  • 5. 1.1.2.1 The usage of ICT in everyday life ◊ EDUCATION In education, teachers, students, researchers and school administrators benefits from the usage of ICT. ◊ BANKING In the banking, customers, businessman & bank administrator benefits from the usage of ICT. ◊ INDUSTRY Computers are used to facilitate production planning and control systems, to support chain management and to help in product design in the industrial sector. In the industrial sector, workers, researchers and administrator benefits from the usage of ICT. ◊ E-COMMERCE E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient and faster. For this application, computers, Internet and shared software are needed. In the e-commerce sector, customers, suppliers and employees benefits from the usage of ICT.
  • 6. 1.1.2.2 Differences between computerised and non-computerised systems. Computerised Non-Computerised more interesting & interactive depends on teachers & textbook experiences all transactions are done by banking was done manually computers Computers and Production was slow because telecommunications industry everything was done depended on became very popular and profitable human labour. since production can be increased through an all day operation. E-commerce plays an important Trading was made using the barter role in the economic scene. It system and it was then later includes distribution, buying, developed into currency. selling and servicing products that are done electronically
  • 7. FASTER COMMUNICATION SPEED SOCIAL LOWER PROBLEMS COMMUNICATION COST impact of ICT on society BORDERLESS RELIABLE MODE OF COMMUNICATION COMMUNICATION EFFECTIVE PAPERLESS SHARING OF ENVIRONMENT INFORMATION
  • 8. COMPUTER ETHICS Computer ethics is a system of moral standards or values used as a guideline for computer users. It is needed to stop the current technology products from being exploited. Ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. Code of ethics in computing means moral guidelines to refer to when using the computer and the Internet.
  • 9. INTELLECTUAL PROPERTY Intellectual property refers to any product of human intellect that is unique and has value in the market place. This covers ideas, inventions, unique name, computer program codes and many more. PRIVACY Privacy in IT refers to data and information privacy. In general, data include texts, numbers, sounds, images and video. Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them. CYBER LAW Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
  • 10. ETHICS LAW  Guideline: As a guideline to  Control: As a rule to control computer users. computer users.  Moral Standards: Ethical behaviour  Judicial Standards: Law is judged is judged by moral standards. by judicial standards.  No Punishments: No punishment for  Must Follow: Computer users must anyone who violates ethics. follow the regulations and law.  Free To Follow: Computer users are  Punishments: Penalties, free to follow or ignore the code of imprisonments and other punishments ethics. for those who break the law.  Immoral: Not honouring computer  Depends On Country: Depends on ethics means ignoring the moral country and state where the crime is elements (immoral). committed.  Universals: Universal, can be  Prevent Misusing Of Computers: To applied anywhere, all over the world prevent misuse of computers.  Produce Ethical Computer Users: To  Crime: Not honouring the law produce ethical computer users means committing a crime.
  • 11. Intellectual property laws are needed to establish and safeguard the intellectual property which refers to works created by inventors, authors and artists. It is also needed as businesses today continue to expand globally. There are four types of Intellectual Property protection. They are patents for invention, trademarks for brand identity, designs for product appearance and copyright for material.
  • 12. •he privacy laws in Malaysia emphasises on the Privacy following: •Security Services to review the security policy Security Management to protect the resources law Security Mechanism to implement the required security services Security Objects, the important entities within the system environment Utilities •Example: anti-spam program, firewall, anti- spyware and antivirus. software
  • 13. Methods of Authentication There are two commonly used authentication methods, which are biometric device and callback system. Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition and Signature Verification. Callback system refers to the checking system that authenticates the user. Methods of Verification There are two methods used in verification, which are user identification and processed object. User identification refers to the process of validating the user. Processed object refers to something the user has such as identification card, security token and cell phone.
  • 14. Pornography Pornography: can lead to criminal acts such as exploitation of women and children can lead to sexual addiction or perversion can develop low moral value towards other men, women or children can erode good religious, cultural and social beliefs and behaviour Slander Slander: can develop into a society that disregards honesty and truth can develop bad habit of spreading untruths and rumours can lead to unnecessary argument can cause people to have negative attitudes towards another person
  • 15.  Cyber Law is needed as in the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet. 1.2.4.2 Computer crimes below Theft Fraud Attacks Copyright Infringement
  • 16. Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification. Three types of computer security are: hardware security software security/data security network security 1.3.2 .1 Security Threats Malicious code Hacking Natural disaster