Monday, August 26, 2019

Social and Ethical Issues Activities

Task 1;
1. Identify a news article that address the 3 strands of the ITGS triangle.

2. Prepare a short presentation that highlights
 a) The  description of the Technology
 b) The description of two main social and ethical significance associated with the technology
 c) Two areas of application to specified scenario

Presentations to be completed

https://sites.google.com/site/keremitgsnotes/home/topic-1-continues

Task 2;
Learning Objectives:
  • Describe common security problems and their impacts.
  • Identify recent examples of various types of malware.
  • Explain good security practices (preventative measures).
  • Apply the ITGS Triangle to security scenarios.

Security;
Security refers to the protection of hardware, software, machines and networks from unauthorized access. Security measures include restricted access to machines and networks for certain employees or to prevent access by hackers. The degree of security of information systems largely determines society’s confidence in the information contained in the systems.

We will read the list of news articles below.


https://fossbytes.com/hacking-techniques/; What are the main types of hacking attacks?

These articles will provide some perspective on the history of hacking, high-profile hacking in 2017, and hacking as it relates to the Internet of Things.
 While reading these articles:
1) Make note of the various kinds of hacking that are noted, so that you can use them as examples in the writing tasks you will do in the future. 
2) Formulate a list of questions raised by the articles.
3) Consider how the issues raised in these articles can be applied to the ITGS Triangle.

Task 4 Period 1 on Monday 2/9/2019
Privacy 
Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes anonymity when, for instance, a person uses it to conceal his or her true identity in order to cyber-bully someone else. Conversely, excessive privacy could also conceal the perpetrators of criminal, terrorist or computer hacking acts from law enforcement agencies.

i) Read the new articles below 
It is about Alexa
https://www.washingtonpost.com/news/powerpost/paloma/the-technology-202/2019/05/06/the-technology-202-alexa-are-you-spying-on-me-here-s-why-smart-speakers-raise-serious-privacy-concerns/5ccf46a9a7a0a46cfe152c3c/?noredirect=on

https://www.forbes.com/sites/kateoflahertyuk/2019/04/12/amazon-staff-are-listening-to-alexa-conversations-heres-what-to-do/#3434049171a2

- Formulate a list of questions raised by the articles
- Describe how the ITGS triangle addressed by the news articles above.

ii) Identify and an ideal current news article which raises Privacy / Anonymity issues and describe how the ITGS triangle is addressed in your OneNote page.

Authenticity
Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is a user login to a network. A more advanced example would be the use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs.

i) Read the new articles below 
Facial Recognition
https://www.scmp.com/news/china/society/article/2115094/china-build-giant-facial-recognition-database-identify-any#targetText=China%20is%20building%20the%20world's,about%2090%20per%20cent%20accuracy.



https://www.pulse.com.gh/bi/tech/facial-recognition-is-almost-perfectly-accurate-heres-why-that-could-be-a-problem/xnvwl26

https://www.aljazeera.com/news/2019/01/ces-2019-facial-recognition-technology-brings-privacy-concerns-190110082030740.html

- Formulate a list of questions raised by the articles
- Describe how the ITGS triangle addressed by the news articles above.

ii) Identify and an ideal current news article which raises Privacy / Anonymity issues and describe how the ITGS triangle is addressed in your OneNote page.

Task 5 Period 1 3/9/2019
Surveillance
Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess employees’ performance. It can be used to support claims for promotion or to ensure that employees follow the organization’s internet policy appropriately.

a) Obtain ONE news article that raises a surveillance issue
b) Describe how the technology impacts on the different stakeholders.
c) Describe ONE main problem of the Technology and ONE solution to the problem.

The digital divide and equality of access
The growth of the use of IT systems has led to disparities in the use of, and access to, information technologies. Disparities exist not only internationally between countries, but also within countries between different socio-economic groups as well as within what may appear to be relatively homogenous groups. This may lead to groups or individuals without access to IT being disadvantaged. For example, while telelearning may bring previously unavailable opportunities to everyone’s doorstep, factors such as the cost and availability
of hardware, software or access to the internet may create a “digital divide”.

a) Obtain ONE picture that shows digital divide and equality of access issue
b) Describe how the the stakeholders are impacted.

c) Describe ONE solution to addressing any of the problem associated with the picture.

Intellectual property
Intellectual property includes ideas, discoveries, writings, works of art, software, collections and presentations of data. Copyright, trademarks and patents exist to protect intellectual property. However, the easy and accurate duplication methods made available through IT can undermine such protection.

a) Obtain ONE video which less 4 mins that represents intellectual Property issue
b) List and describe how the the stakeholders are impacted in the video.

c) How would you have improved the video to present the issue clearly?

Task 6 4/9/2019 Period 3
Policies
Policies are enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies. They can be developed by governments, businesses, private groups or individuals. They normally consist of rules governing access to, or use of, information, hardware, software, and networks.

a) Compare TWO policies for Facebook and Instagram social media platform and share the similarities and the difference on your OneNote page.

b) Imagine you have developed a unique software or invented a new digital device; What would you include in your policy statements and why? 

Standards and protocols
Standards and protocols are technical rules and conventions that enable compatibility and therefore facilitate communication or interoperability between different IT systems and their components. They might govern the design and use of hardware, software and information.

a) Apple phones charges are too different from other phone chargers, why is that so?

b) Justify the reasons for having the same rules and protocols to enable compatibility between IT systems / devices.

Task 7 (Use your class time to complete all the pending tasks in this page)
Create an animation or a video that explains the 4 remaining social and ethical issues;
a) The video /Animation should be less than 4 mins
b) Use images as much as possible
c) Use background music in the background
d) Have your voice recorded within the solution.

Use can try signing up for https://animoto.com/ or any other online solution.


Tuesday, August 20, 2019

ITGS Resources lists

Online Resources
https://www.itgsnews.com/
https://www.youtube.com/channel/UC6YRayRTYvyTxb9tfUcOGxw/playlists
https://sites.google.com/site/mrstevensonstechclassroom/teacher-s-resources
https://blogs.osc-ib.com/author/triplea_bs/page/4/
Ted Tech talks
https://www.ted.com/talks?topics%5B%5D=technology


Tech News Resources
BBC tech news
https://www.bbc.com/news/technology
Wired News
https://www.wired.com/tag/technology/
https://www.entrepreneur.com/topic/information-technology
Computer Weekly
https://www.computerweekly.com/
Cnet News
https://www.cnet.com/news/
IT world
https://www.itworld.com/news/
Science Daily
https://www.sciencedaily.com/news/computers_math/information_technology/
Tech Video News
Reuters Tech News
https://www.reuters.com/video/technology
Techworld News
https://www.technewsworld.com/
Where Technology is bring
https://everwideningcircles.com/technology-on-ewc/?gclid=CjwKCAjwtO7qBRBQEiwAl5WC290ebv_UicbcbaqYdHGzqY4l3NTEk6rXpNFEvwyYNgahZjukzOlMrhoCjtMQAvD_BwE

IT news
https://www.itnews.com/

Textbooks Resources List

Technology In Action, Complete, 10e.

http://wps.prenhall.com/bp_evans_techinaction_10/

Computers are Your Future, 12e.


Computer Confluence


Tomorrow's Technology and you  

Computers 12/e.


Digital Planet

Technology In Action 10th Edition

Wednesday, August 14, 2019

ITGS Class of 2019-2021

ITGS CLASS EXPECTATIONS

  • Treat everyone with respect.
  • Respect everyone's right to learn
  • Meet all set deadlines
  • Participation highly encouraged.
  • Observe Punctuality always for all lessons
  • Use OneNote for notes and for collaborative work.
Breakdown of Our lessons
  • Monday  ITGS Syllabus Content (IT Systems) Strand 1&2
  • Tuesday ITGS Syllabus Content (IT systems) Strand 1&2
  • Wednesday ITGS Syllabus Content (IT systems) Strand 1&2
  • Thursday Lesson Paper 2 News Articles (Strand 1, 2, & 3)
  • Friday Lessons Project Activities
Managebac Details
    Categories of work
  • Homework and Class Participation
  • Project Tasks
  • Case Studies Assignments
  • Paper 2 News Articles Tasks
  • Tests
Grade boundaries for all ITGS Tasks

7  - 79-100
6  - 66-78
5  - 54-65
4  - 41-53
3  - 26-40
2  - 13-25


IB ITGS Video Basics
https://www.youtube.com/watch?v=jQNV0wwMSdE&list=PLsbDxsOnM1BV9e9R1waRjSZ1jzSTYJbpD&index=3


TASK 1: Main terms
Read the guide on page 4, 5, and 6.

From the reading;
a) What is the difference between 

   i) Information Technology (IT) and Information system?
   
   ii) Social impacts and ethical considerations?

   iii) ITGS project and ITGS Extended Essay?

b) How is ITGS different from Computer science and how are they similar?

    Post your comments in the comment below.

    You will need a gmail account to able to post.

TASK 2 : Social and Ethical Significance

Read the guide on page 20 - 22. and you can also watch the Youtube on 

https://www.youtube.com/watch?v=4qiMTuruk0M


Task 3:
Watch the video in the page below

a) Strand 1: What are some of the possible social and ethical significance that can arise from the news video.

b) Strand 2: What are some of the application areas relevant to the news video?

c) Strand 3: What are some of the IT terms and concepts arising from the video directly or indirectly?

Mid-term DS Paper 3 Research Activities

  See below the assigned area of investigation Az-zara:  AI-Based Hiring Platforms: HireVue Objective: Research how HireVue uses AI-driven...