0% found this document useful (0 votes)
100 views

Group 5 and 6

1) Humans began developing information technology as early as 3000 BC by painting forms on cave walls to represent objects and communicate through grunts and gestures. 2) Writing systems like cuneiform and hieroglyphs were developed around 3000 BC, allowing information to be recorded and shared through symbols and letters. 3) Major developments in information and communication technology from the 1400s to present include the printing press, computers, telegraph, telephone, film, and the internet. These innovations have transformed how information is processed, stored, transmitted and accessed globally.

Uploaded by

Fernando Pascual
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views

Group 5 and 6

1) Humans began developing information technology as early as 3000 BC by painting forms on cave walls to represent objects and communicate through grunts and gestures. 2) Writing systems like cuneiform and hieroglyphs were developed around 3000 BC, allowing information to be recorded and shared through symbols and letters. 3) Major developments in information and communication technology from the 1400s to present include the printing press, computers, telegraph, telephone, film, and the internet. These innovations have transformed how information is processed, stored, transmitted and accessed globally.

Uploaded by

Fernando Pascual
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 58

HISTORY OF INFORMATION AND COMMUNICATION

TECHNOLOGY 1. THE PREHISTORIC PERIOD


a. Period (3000 BC)

Humans developed information technology at this time serves as a system for the introduction of the
forms that they know. They describe the information they get on the walls of the cave, about hunting
and prey animals. At this time they began to identify objects that exist in the environment they live and
represent it with the forms which they then painted on cave walls where they live, because of their
ability to speak only about the form of voice grunts and hand gestures as a form of their initial
communication at this time. Further development is created and use the tools that generate sounds
and cues, such as drums, trumpets made of animal horn, or smoke signals as a means of giving warning
of danger.

For the first time cuneiform is used


by the Sumerians writing with
symbols formed from
pictograph as letters. Symbols or letters also
have a different sound form
(mention), so it can
be words, sentences and language.

b. Historical Period (3000 BC s / d in 1400-


an M)

1) 2900 BC
The use of letters hieroglyph on the ancient
Egyptians. Hierogliph a language of symbols where
each phrase is represented by different symbols.
When combined into one will have a way of
pronunciation and different meanings.
Heiroglyph form of writing and language is more
advanced than Sumerian writing.

2) 500 BC
Papyrus fibers are used as paper. Paper made from papyrus tree fiber that grows around the Nile is a
medium for writing or media information that is more powerful and flexible than the clay tablets that
were previously used as a medium of information.

3) 105 M
The Chinese discovered
kertas.Kertas discovered by the
Chinese at this time is the paper
that you know today. Paper is
made from bamboo fibers are crushed, filtered, washed, then flattened and dried. The invention also
allows the printing system is performed using a carving on a block of wood and covered by the ink or
what we know today with a cap.

2. MODERN PERIOD (1400-S AN M / D NOW)


a. Year 1455
The printing press that uses the letters are made of iron plate that can be changed in a frame made of
wood was developed for the first time by Johann Guntenberg.

b. Of 1830
Augusta Lady Byron wrote the first
computer program in the world to
work with Charles Babbage’s
Analytical engine it uses. The tool is
designed to be able to enter data,
process data, and generate output in
the form of a card. This machine is
known as a form of the first digital
computer, although the way it works
is more mechanical than is digital, 94
years before the first digital computer
ENIAC 1 is formed.

c. In 1837
Samuel Morse developed the telegraph and Morse
code language with Sir Wiliam Cook and Sir Charles
Wheatstone who sent electronically
between two distant parties through the cable
connecting the two places Sending and
receiving of this information can be sent and
received at almost the same time this
invention allows the information can be
accepted and used widely by the people
unhampered by distance and time.

d. In 1861
Moving images are projected onto a screen was
first used as the precursor film is now in ancient
times as the projector is growing step on the
screen. e. During the year 1876 was marked by
figures who developed the Melvyl Dewey
decimal system of writing.

f. In 1877
1) Alexander GrahamBell
invented and developed the first time used the
phone in general.

2) high-speed photography was


invented by Edward Maybridge.

g. In 1899
Used in tape storage system (tape
the first magnetic storage but at this
time is still analog not digital like the
present. h. During the year 1923 was
marked by Zvorkyn creating the first
television tubes.

i. In 1940
Commencement of the development of science in
the field of information during World War 2, which is used
for the benefit of sending and receiving
of military documents that are stored in the form of
magnetic tape.
j. In
1945
Vannevar Bush developed a coding system using hypertext.Pada this period
the use of hypertext has been developed along with the development of website design is currently
evolving.

k. During the 1946 period


This technology in the world’s first digital computer ENIAC was developed although I have not so many
users, but computer technology has been used certain agencies.

l. Year 1948
Researchers at Bell Telephone developed the transistor.

m. Year 1957
1) Jean Hoerni developed the planar transistor. This technology allows the development of millions and
even billions of transistors incorporated into a small piece of silicon crystal.
2) USSR (Russia at the time) as the launching of Sputnik the first artificial earth satellite who served as a
spy. In return the U.S. to form the Advanced Research Projects Agency (ARPA) under the authority of
the Department of Defense to develop science and information technology in the military field.

n. Year 1972
At this time Ray Tomlinson created the first e-mail program that is used to communicate over long
distances using teks.E-mail can be said as electronic mail.

o. Year 1973-1990
The term Internet was introduced in a paper on TCP / IP and then made the development of a network
protocol known as TCP / IP was developed by a group of DARPA.Pada the 1981 National Science
Foundation to develop a backbone called CSNET 56 Kbps capacity for each institution in
pemerintahan.Kemudian in 1986, the IETF developed a server that serves as a coordination tool
including: DARPA, ARPANET, DDN, and Internet Gateway.

p. Year 1991 –Now


The business systems in the IT field first occurs when the CERN in overcoming operational costs a fee
from its members. In 1992 the establishment of the Internet community, and then introduced the term
World Wide Web (WWW) by CERN.Pada 1993, NSF established the InterNIC to provide Internet related
services and data storage directories and databases (by AT & T), registration services (by Network
Solutions Inc. ), and information services (by General Atomics / CERFNET). In 1994 the growth of the
Internet drove very fast and began reaching into all aspects of human life and a part that can not be
separated from manusia.Tahun 1995, public enterprises began to be allowed into the provider by
purchasing network in this Backbone.Langkah began development of information technology especially
the internet and research to develop systems and more sophisticated tools.
COMPUTERS
The term “computer” comes from the Latin “computus” and “computare”. Both Latin words mean to
determine by mathematical means or by numerical methods. The English verb “compute” has the same
meaning.

Basically, a computer is a programmable electronic device that performs mathematical calculations and
logical operations, especially one that can process, store and retrieve large amounts of information very
quickly. Personal computers are also employed for manipulating text or graphics, accessing the Internet,
or playing games or media.

The main components of a computer are:


a Central Processing Unit (CPU), a monitor, a
Keyboard, a mouse.

Originally the first computers were the size of a large room,


consuming as much power as several hundred modern personal
computers.

The US-built ENIAC (Electronic Numerical Integrator and


Computer) was the first electronic programmable computer built
in the US.
Later, computers have become smaller and much more powerful.

THE INTERNET
The Internet was invented as a result of researches conducted in the early 1960s by visionary people
like J.C.R. Licklider of MIT.
The latter saw the added value of allowing computers to share information on research and
development in scientific and military fields. That’s why, he proposed a global network of computers in
1962, and moved over to the Defense Advanced Research Projects Agency (DARPA) in late 1962 to head
the work to develop it.

THE WEB
While many people use the terms Internet and the Web interchangeably, they are in fact not
synonymous.
The Internet is a huge network that connects millions of computers together worldwide.
Computers in this network can communicate with any other computer as long as they are connected to
the Internet.

The Web or theWorld Wide Web (WWW), however, is a way of accessing information over the
medium of the Internet. It is an information space or a model that is built on top of the Internet where
documents and other web resources are identified by URLs (Uniform Resource Locator), informally
termed a web address. This space is interlinked by hypertext links, and can be accessed via the Internet.

The World Wide Web was invented by English scientist Tim Berners-Lee in
1989. He wrote the first web browser in 1990 while employed at CERN in
Switzerland.

WEB 1.0, WEB 2.0, WEB 3.0, WEB 4.0 AND WEB 5.0

WEB 1.0
Web 1.0 was the first stage of the World Wide Web’s evolution. Basically, content creators provided
content for the vast majority of users who were only consumers or readers of that content.

The most important features of Web 1.0 were as follows:


 It was a read only web
 It was based on HTML which is a basic computer language.

 It was characterized by static pages (there is no interactivity between users and websites).
 It was also characterized by slow connection speed.
 The software was very expensive, generally on CDs or DVDs to be installed.

WEB 2.0
Web 2.0 was the next evolution of the Web. It is more sophisticated and is characterized by its social
aspect. Unlike Web 1.0, Web 2.0 is a many-to-many relationship.

Here are the features of Web 2.0:


 It is a read-and-write web.
 It is based on more sophisticated computer languages (PHP, Mysql, Java Script…)
 The pages are dynamic pages, which means that there is the possibility of interactivity between
users and the web.
 It is characterized by speed.
 The software is more accessible. It is on line or downloadable.

WEB 3.0
Web 3.0 is an evolution of the Web as an extension of Web 2.0.
It is also called the Semantic Web. It is characterized by connective intelligence, connecting data,
concepts, applications and ultimately people.

Here are its features:


 Read, write and execute web.
 Users are served more intelligently.
 Personalized information.
 Machine comprehension.
 Cloud Technology.
 Everything is connected.  Immersion.

WEB 4.0
Web 4. or the symbiotic web will lead to an interaction between humans and machines in symbiosis.
Machines would be clever on reading the contents of the web and react fast by providing superior
quality content.

WEB 5.0:
Web 5.0 or the emotional web is a version that is still developed underground. The web will interact
with users and will be able to recognize their emotions. So far the web is neutral as far as emotions are
concerned. This will probably change in the future.

USES OF ICT IN DAILY LIVES


Every day, people use computers in new ways. Computers are increasingly
affordable; they continue to be more powerful as information-
processing tools as well as easier to use.

Computers in Business :
One of the first and largest applications of computers is keeping and managing business and financial
records.

Most large companies


keep the employment
records of all their
workers in large
databases that are
managed by computer
programs. Similar
programs and databases
are used in such business
functions as billing
customers; tracking
payments received and payments to be made; and tracking supplies needed and items produced,
stored, shipped, and sold. In fact, practically all the information
companies need to do business involves the use of computers and
information technology.

On a smaller scale, many businesses have replaced cash registers with point-of-sale (POS) terminals.
These POS terminals not only print a sales receipt for the customer but also send information to a
computer database when each item is sold to maintain an inventory of items on hand and items to be
ordered.

Computers have also become very important in modern factories. Computer-controlled robots now do
tasks that are hot, heavy, or hazardous. Robots are also used to do routine, repetitive tasks in which
boredom or fatigue can lead to poor quality work.

Computers in Medicine :
Information technology plays an important role in medicine. For example, a scanner takes a
series of pictures of the body by means of computerized axial tomography (CAT) or magnetic resonance
imaging (MRI).

A computer then combines the pictures to produce


detailed three-dimensional images of the body's organs. In addition, the MRI produces images that show
changes in body chemistry and blood flow.

Computers in Science and Engineering :


Using supercomputers, meteorologists predict future weather by using a combination
of observations of weather conditions from many sources, a mathematical representation of
the behavior of the atmosphere, and geographic data.

Computer-aided
design and computer-aided manufacturing programs, often called
CAD/CAM, have led to improved products in many fields, especially where designs tend to be very
detailed. Computer programs make it possible for engineers to analyze designs of complex structures
such as power plants and space stations.

Integrated Information Systems :


With today's sophisticated hardware, software, and communications technologies, it is often difficult to
classify a system as belonging
uniquely to one specific
application program.

Organizations increasingly
are consolidating their
information needs into a
single, integrated
information system. One
example is SAP, a German
software package that runs on mainframe computers and provides an enterprise-wide solution for
information technologies.

It is a powerful database that enables companies to organize all their data into a single database, then
choose only the program modules or tables they want. The freestanding modules are customized to fit
each customer's needs

Education:
The advent of
Information Technology has
changed the meaning
of the term
“literate”, with
computer literacy being
almost as important as
basic literacy in many cases.

Computer education is
an essential course
at the primary level in most
schools across the world. With
more information getting
digitized every
day, and the internet making it accessible to anyone across the world, students are increasingly relying
on electronic sources of information rather than physical libraries for their needs.

Instructional methodology has also undergone a sea change with use of images, animations,
videos, presentations and e-learning to complement traditional techniques.

Governance:
The concept of e-governance is one of the most novel applications of Information Technology whereby
it is changing the lives of millions across the globe. Computerization of Government activities makes it
easier to supervise and audit, and makes the administration more responsive to the needs of society.

It also bridges the divide between the Government


and the people.
Technologies like touch-screen kiosks help
disseminate information on land records,
photo identity cards, pending bills etc. and
enable even illiterate people to take more informed
decisions. India is leading the world in the effective use of IT
for elections.

Entertainment:
IT has changed the lifestyle of most people. The
convergence of various technologies has created
various options for entertainment like games,
streaming music and video, digital television
broadcasts, satellite radio, animated movies etc.
which can be accessed with the help of mobile
phones, PDAs, notebook computers or on
television either with a cable connection or
wirelessly using newer-generation WiFi, CDMA
or GPRS technologies.

Information Technology plays a vital role in most of


our daily activities. There is hardly anyone who has
not been affected or influenced by IT. With each
passing day, newer applications of IT are being developed which increase our interaction with and
dependence on IT-enabled devices. Therefore, understanding this technology and using it creatively is
imperative to human progress.

IMPACTS OF ICT IN THE SOCIETY


Information communications technology (ICT) has the power to transform society.

It also enables financial inclusion through m-commerce and allows people to connect with millions
instantaneously.

The impact of ICT on business is particularly significant. It empowers people to share knowledge
and advice instantaneously and set up an online shop or website at a low cost, dramatically lowering
the barriers to starting a business. As such, it is an important enabler of change and ICT maturity is
closely linked to economic growth.

Advances in technology have always been used by for-profits to increase revenue. However,
government bodies and NGOs have struggled to successfully apply them for social good. An emerging
type of business, the social business, is bridging the gap between the two. ICT is playing a central role in
the emergence and development of social businesses.

These companies are driven by a social cause, but seek financial stability through profit making in order
to further their impact. This combination is allowing them to effectively utilize technology for good. The
impact of ICT infrastructure on social businesses cannot be understated. It has made social impact
affordable, social impact scalable, and enables new ways to connect to and engage with local
communities (a key characteristic of the social
business). I

CT is empowering social businesses to make a real difference in communities around the world,
securing a better future for the digital generations to come.
ICT is developing social businesses in three main ways:

POSITIVE IMPACTS OF ICT ON PEOPLE


 Affordability
Starting any business can be financially challenging. But for social entrepreneurs, whose primary intent
is to engage with local communities rather than to make profit, it can be particularly daunting. In the
initial stages, it can also be difficult to convince investors to part with their money for a social cause. ICT
solutions have decreased set-up costs in an unprecedented way. This helps social entrepreneurs to
make it through this uncertain period without major investments or losses – and advice is only the click
of a button away.

 Scalability
ICT infrastructure allows us to connect instantaneously with millions. For social entrepreneurs, this
means that their initiatives aren’t just limited to one community; they can easily reach the people they
want to empower and spread their message far and wide. Many social businesses also utilize ICT
solutions to optimize processes, reduce costs and increase accuracy, enabling the business to be scaled
up faster. For example, Sanergy in Nairobi, Kenya, uses radiofrequency identification sensors to alert
the waste team to when a toilet needs to be emptied. SiembraViva in Medellín, Colombia, is developing
solutions that will allow them to monitor harvests remotely and alert farmers to problems quickly.

 Community
To ensure lasting empowerment, social businesses work from within the community. As previously
highlighted, ICT allows social entrepreneurs to continuously connect with the people they wish to
empower in a direct and engaging way. Online channels are also an incredibly powerful way to
broadcast business messages. Although the presence of a social business is very much on the ground
within the community, its story can be told online through webpages and social media, reaching a
global audience.

 Access to information:
Possibly the greatest effect of ICT on individuals is the huge increase in access to information and
services that has accompanied the growth of the Internet. Some of the positive aspects of this increased
access are better, and often cheaper, communications, such as VoIP phone and Instant Messaging.

In addition, the use of ICT to access information has brought new opportunities for leisure and
entertainment, the facility to make contacts and form relationships with people around the world, and
the ability to obtain goods and services from a wider range of suppliers.

 Improved access to education,


E.g. distance learning and on-line tutorials. New ways of learning, e.g. interactive multi-media and
virtual reality. New job opportunities, e.g. flexible and mobile working, virtual offices and jobs in the
communications industry.

 New tools, new opportunities:


The second big effect of ICT is that it gives access to new tools that did not previously exist. A lot of
these are tied into the access to information mentioned above, but there are many examples of stand-
alone ICT systems as well:

A. ICT can be used to help people overcome disabilities. e.g. screen magnification or screen
reading software enables partially sighted or blind people to work with ordinary text rather
than Braille.

B. ICT can be used for processes that had previously been out of the reach of most individuals,
e.g. photography, where digital cameras, photo-editing software and high quality printers
have enabled people to produce results that would previously require a photographic studio.

NEGATIVE IMPACTS OF ICT ON PEOPLE


Job loss:
One of the largest negative effects of ICT can be the loss of a person’s job. This has both economic
consequences, loss of income, and social consequences, loss of status and self-esteem. Job losses may
occur for several reasons, including:

Manual operations being replaced by automation. e.g. robots replacing people on an assembly line. Job
export. e.g. Data processing work being sent to other countries where operating costs are lower.
Multiple workers being replaced by a smaller number who are able to do the same amount of work.
e.g. A worker on a supermarket checkout can serve more customers per hour if a bar-code scanner
linked to a computerized till is used to detect goods instead of the worker having to enter the item and
price manually

Reduced personal interaction:


Being able to work from home is usually regarded as being a positive effect of using ICT, but there
can be negative aspects as well. Most people need some form of social interaction in their daily lives
and if they do not get the chance to meet and talk with other people they may feel isolated and
unhappy.

Reduced physical activity:


A third negative effect of ICT is that users may adopt a more sedentary lifestyle. This can lead to health
problems such as obesity, heart disease, and diabetes. Many countries have workplace regulations to
prevent problems such as repetitive strain injury or eyestrain, but lack of physical exercise is rarely
addressed as a specific health hazard.
II. THE WEB AND THE INTERNET
The World Wide Web or the Web was presented by Tim Burners-Lee in late 1989. He
view of the capabilities of the World Wide Web was expressed by three innovations, typically
associated with three phases: namely, the Web of documents (Web 1.0), the Web of people
(Web 2.0) and the Web of data (the still-to-be-realized Web 3.0).Through its life cycle, the
World Wide Web has been through various phases of development. Going by the trend of
constant evolution, the Web is now slowly but surely transiting to more data centric phase in
the context of Web version 3.0.
Technically, the World Wide Web is a system of interlinked hypertext documents
accessed via the Internet. With a web browser, one can view web pages that may contain text,
images, videos, and other multimedia and navigate between them via hyperlinks.
The World Wide Web is not synonymous with the internet but is the most prominent
part of the internet that can be defined as a techno-social system to interact humans based on
technological networks. The notion of the techno-social system refers to a system that
enhances human cognition, communication, and co-operation; Cognition is the necessary pre-
requisite to communicate and the precondition to co-operate. In other words, cooperation
needs communication and communication needs cognition.
1. World Wide Web
A VIRTUAL CITY on the Internet which allows documents to be connected to other documents
by hypertext links.
An INFORMATION SYSTEM that everyone owns and explains how it is organized in a way that
mimics our brain's natural way of thinking.
WEB 1.0

 The first generation of the Web, Tim Berners-Lee called as read-only or static web.
 The birth of Information Age.
 Web 1.0 lasted from 1989 to 2005.
CHARACTERISTICS

 Web 1.0 sites are static.


 Web 1.0 sites are not interactive.
 Web 1.0 applications are proprietary.
WEB 2.0

 The second generation of the Web, also known as Dynamic Web.


 Web 2.0 marks the emergence of social interactive media and features
CHARACTERISTICS
 Interactive
 Organized
 Informative
 Pertinent
 Less Cluttered
THINGS THAT YOU CAN DO IN WEB 2.0:

 Social Networking
 Content writing and submission
 Post blogs
 Post comments, reviews, etc.
 Information Search
 Slide share
 Social Bookmarking
ADVANTAGES

 Create a large and strong network.


 Increase in number of audiences.
 More interaction leads to higher exchange of knowledge.
 Build strong relationships.
DISADVANTAGES

 People are highly dependent on internet to network.


 Wastage of time.
 High number of frauds and hackers.
WEB 3.0
The term Web 3.0 was coined by the reporter John Markoff of The New York Times in
2006, refers to a new evolution of the web, its third generation, and includes specific
innovations and practices.
Web 3.0 is one of modern and evolutionary topics associated with the following
initiatives of Web 2.0. Web 3.0 was first coined by John Markoff of the New York Times and he
suggested web 3.0 as third generation of the web in 2006. Web 3.0 can be also stated as
“executable Web”.
There are four main features main features that can help us describe Web 3.0:
1. Semantic Web
The next evolution of the Web involves the Semantic Web. The semantic web
improves web technologies in order to generate, share and connect content through
search and analysis based on the ability to understand the meaning of words, rather
than on keywords or numbers.
2. Artificial Intelligence
Combining this capability with natural language processing, in Web 3.0,
computers can understand information like humans in order to provide faster and more
relevant results. They become more intelligent to satisfy the needs of users.

3. 3D Graphics
The three-dimensional design is being used extensively in websites and services
in Web 3.0. Museum guides, computer games, ecommerce, geospatial contexts, etc. are
all examples that use 3D graphics.
4. Ubiquity

Content is accessible by multiple applications, every device is connected to the


web, the services can be used everywhere
By extending Tim Berners-Lee’s explanations, the Web 3.0 would be a “read-write-
execute” web. However, this is difficult to envision in its abstract form, so let’s take a look at
two things, that will form the basis of the Web 3.0 — semantic markup and web services.
Semantic markup refers to the communication gap between human web users and
computerized applications. One of the largest organizational challenges of presenting
information on the web was that web applications weren’t able to provide context to data, and,
therefore, didn’t really understand what was relevant and what was not. While this is still
evolving, this notion of formatting data to be understood by software agents leads to the
“execute” portion of our definition, and provides a way to discuss web service.
A web service is a software system designed to support computer-to-computer
interaction over the Internet. Currently, thousands of web services are available. However, in
the context of Web 3.0, they take center stage. By combining a semantic markup and web
services, the Web 3.0 promises the potential for applications that can speak to each other
directly, and for broader searches for information through simpler interfaces.
WEB 4.0
Web 4.0 is a new evolution of the Web paradigm based on multiple models,
technologies and social relationships. The concept of Web 4.0 is not totally clear and
unanimous in literature, because it is composed by several dimensions. In this sense, this study
uses a systematic review approach to clarify the concept of Web 4.0 and explore its various
dimensions, analyzing if they have elements in common. The findings indicate that the number
of studies published from 2009 to 2017 on this field significantly increased, having reached a
peak in 2014. Furthermore, we identified five dimensions associated with the Web 4.0
paradigm, in which the terms "pervasive computing" and "ubiquitous computing" are the most
widely used in the literature. On the other side, terms such as "Web 4.0", "symbiotic Web" and
"Web social computing" are not often used.
The next step is not really a new version but is an alternate version of what we already
have. Web needed to adapt to it is mobile surroundings. Web 4.0 connects all devices in the
real and virtual world in real-time.
A standard for Internet 4.0 has not yet been established, and it does not have a name
yet, but there are clues to know how it will evolve. Others might be able to call Web 4.0 the
“active web”. In the current web 3.0, the use of search engines is still essential, and these give
us information, in its largest content web pages, which we can use according to our needs.
So, if for example we want to find accommodation in Rome for one night in a Hotel, we
just need to write in a search engine something like “hotel room Rome”, and the search engine
gives us a list of web pages, usually room finders, which we will use accordingly. Web 4.0 will be
quite different from this. When fully developed, it will remove several of the steps required
when using web 3.0, this way its use is more direct and “invisible”.
CHARACTERISTICS OF WEB 4.0 INCLUDES:

 This web environment must therefore be an "always on" connected world. Users can
meet each other on the web.
 The new web is a Web OS - the whole web is a single operating system where
information flows from each point to another system.
 In the background, self-learning systems are learning to understand you using artificial
intelligence.
 It communicates with users in the same way that people communicate with each other.
 Web 4.0 is an open, linked and intelligent web.
 The speed and reliability of Web 4.0 are greater than ever.
2.TYPE OF WEBSITES
Personal Websites

 Personal blogs/vlogs, online dairy, photo sharing


 Social Media Platforms
Examples

 Facebook (largest social networking site in the world)


 Twitter
 Tumblr
 Photo sharing websites (Instagram, Snapchat)
 Messaging websites (Messenger, WeChat, Skype, Viber)
Photo Sharing Websites
Image sharing, or photo sharing, is the publishing or transfer of
digital photos online. Image sharing websites offer services such as uploading, hosting,
managing and sharing of photos (publicly or privately)
Examples

 Snapchat
 Instagram
 Google Photos
 Dropbox
 Photobucket
 Flickr
Writer’s / Author’s Websites
A writers website would include a biography, a catalog of published books and works,
perhaps excerpts from some works, links to publications on sites like Amazon.com, a link to the
writer's blog, reviews and comments on the author's publications.
Examples

 Goodreads
 Veronica Roth (Divergent)
 Jennifer Niven (All the Bright Places)
 Chuck Wendig (Author, Graphic artist, gamedeveloper)
Community Building Websites
These websites build online communities of people who want to interact with other
people socially or meet people who share their interests.
Example

 Social Media Platforms (Facebook, LinkedIn)


 Online forums (Quora, Reddit)
 Pinterest
 Photo Sharing
 Dating Sites (Tinder, Bumble, Grindr)
Non-profit Website
A nonprofit website is the easiest way for many potential donors to make donations and will be
the first place many people look to learn more about a nonprofit and determine if they want to
support it.
You can use it to promote the projects your organization tackles, encourage followers to take
action, and for accepting donations.
Example

 Philippine Red Cross


The PRC provides six major services: Blood Services, Disaster Management Services, Safety
Services, Community Health and Nursing Services, Social Services and the Volunteer Services.

 Philippine Animal Welfare Society


A volunteer-based organization working towards protection of animals from cruelty through
education, sheltering and advocacy.

 Worldwide Fund for Nature


 Philippine Center for Investigative Journalism
An independent, nonprofit media agency that specializes in investigative reporting of political,
social, and related issues surrounding the Filipinos.
Web portal
They collect information in different formats from different sources into one place to
make all relevant information accessible to the people who need to see it. They often involve a
login and personalized views for different users that ensure the information that’s accessible is
most useful to their particular needs.
Example

 TSU Portal (insert pic)


Mobile Device Websites
The mobile web refers to browser-based World Wide Web services accessed from
handheld mobile devices, such as smartphones or feature phones, through a mobile or
other wireless network.
Blogging Websites
A blog website is a site that is updated with new information on an ongoing basis. It
normally consists of a collection of posts. Posts may be short, informal, controversial, or more
professional.
Informational Websites
Informational websites are those sites which are created to provide a customized and
branded resource for potential and active customers, members, investors and so forth. These
websites are usually content, and design driven.
Ecommerce Websites
eCommerce websites are online portals that encourage online exchanges of services
and goods through means of the transfer of data and assets over the Internet. 
Magazine Websites
A web magazine is a linear, finite edition of a magazine, just like the app edition.
Readers can turn the pages and progress through the magazine the same as they would an app
or print magazine.
Portfolio Websites
A portfolio website provides professional information about an individual or a
company and presents a showcase of their work.
3.THE INTERNET

 The Internet or “Net” (network of networks) is the largest computer network in the
world that connects billions of computer users.
 The world internet comes from combination between “interconnection” and “Network”.
 Network is a collection of computers and devices connected via communication
channels and transmission media allow to share resources (hardware, software, data,
information).
 Generally, nobody own internet.
 The vast collection of computer networks which from and act as a single huge network
for transport of data and messages across distances which can be anywhere from the
same office to anywhere in the world.
BRIEF HISTORY

 ARPA- Advanced Research Project Agency


 January 2, 1969- Started an experimental Computer Network.
 Concept- No Server, but equal importance/participation to every computer in the
Network.
 Even if, one of the nodes destroyed that will not affect the Network.
 In 1982, the word internet started.
 1986: First “free net” created in Case Western Reserve University
 1991: US government allowed business agencies to connect to internet
 Now all people can connect to internet and improve their life and work quality.
 The internet support various aspects in our life.
 Tim Berners-Lee introduced the World Wide Web: an internet that was not simply a way
to send files from one place to another but was itself a “web” of information that
anyone on the Internet could retrieve. Berners-Lee created the Internet that we know
today.
 Vinton Cerf is the father of the internet, having been the co-inventor of TCP/IP, having
led influential work at DARPA, then at MCI, where he pioneered an email platform called
MCI Mail.
USES OF INTERNET

 Education
 Speed Up Daily Tasks
 Shopping
 Research & Development
 Business Promotion and Innovation
 Communication
 Digital Transactions
 Tour & Travel
 Entertainment
 Job-hunting
ADVANTAGES OF THE INTERNET
Communication

 Communication is a process transmitting and receiving symbol, data, image, text,


document, graphic etc by using various computer devices.
 Internet now being a main communication tool. Using video conferencing, internet
phone, Messenger, email etc.
Research

 To do research, you need to go through hundreds of books as well as the references and
that was one of the most difficult jobs to do earlier.
 Research is one such thing which has got lots of benefit from this evolution of internet.
Education

 Education is one of the best things that the internet can provide
 There are a number of books, reference books, online help centers, expert’s views and
other study-oriented material on the internet that can make the learning process very
easier as well as a fun learning experience.
Financial Transactions
 Financial transaction is the term which is used when there is exchange of money.
 With the use of internet in the financial transaction, your work has become a lot easier.
 With the ability to do the financial transaction easily over the internet you can purchase
or sell items so easily
DISADVANTAGES OF INTERNET
Theft of Personal Information

 The use of Internet for banking, social networking, or other services, often makes our
personal information vulnerable to theft
 Unscrupulous hackers can access our sensitive information through unsecured
connections by planting phishing software.
Spamming

 Spamming refers to sending unwanted e-mails, which serve no purpose and needlessly
obstruct the computer system
 Spammers usually use bots that bombard the receiver with an endless line of
advertisements.
 This can prove to be increasingly perplexing, as it keeps getting mixed with our more
important emails
Malware Threats

 One of the most annoying problems with the Internet is the ease with which any
malware can infect our computers.
 Virus programs are inconspicuous and may get activated simply by clicking a seemingly
harmless link
 Computers connected to the Internet are extremely prone to IP targeted virus attacks
that may end up crashing the system completely.
Social Isolation, Obesity and Depression

 The biggest problem with having the Internet is, its ability to create rifts between the
real and virtual world.
 There is an addiction for everything that pertains to the web and that includes excessive
surfing, online gambling, social networking, and gaming addiction
REFERENCES:
Aghaei, S., Nematbakhsh, M. A., & Farsani, H. K. (2012, January). Retrieved from International
Journal of Web & Semantic Technology (IJWesT) :
https://pdfs.semanticscholar.org/8cb3/93c3229e8f288febfa4dac12a0f6298efb93.pdf
Almeida, F. (2017, November). Research Gate. Retrieved from Research Gate Website:
https://www.researchgate.net/publication/321366810_Concept_and_Dimensions_of_
Web_40#:~:text=Web%204.0%20is%20a%20new,models%2C%20technologies%20and
%20social%20relationships.&text=On%20the%20other%20side%2C
%20terms,computing%22%20are%20not%20often%20used.
Choudhury, N. (2014). Retrieved from International Journal of Computer Science and
Information Technologies:
http://ijcsit.com/docs/Volume%205/vol5issue06/ijcsit20140506265.pdf
Expert System. (2020, April 30). Retrieved from Expert System Website:
https://expertsystem.com/web-3-0/
Flat World Business. (n.d.). Retrieved from Flat World Business Website:
https://flatworldbusiness.wordpress.com/flat-education/previously/web-1-0-vs-web-2-
0-vs-web-3-0-a-bird-eye-on-the-definition/
IT Pedia. (2018, November 12). Retrieved from https://en.itpedia.nl/2018/11/12/web-4-0-the-
internet-of-things-en-ai/
Pandora FMS. (2018, March 5). Retrieved from Pandora FMS Website:
https://pandorafms.com/blog/web-4-0/
https://asianetbroadband.in/importance-of-internet-technology-for-easy-life/
https://www.slideshare.net/sushruth645/internet-ppt-36201939?
fbclid=IwAR3psyotyLUfgg5aHJJvRcZoaVXLeeYwxB7mk283BHhsujDqoYYdF_GpEbE
Group 3
Goal Diggers
Agustin, Juan
Gamurot, Kristine
Lactao Blesie Joyce
Pitacio, Jessica
Samson, Ronnel
CURRENT TRENDS AND EMERGING TECHNOLOGIES
1. Artificial Intelligence (AI)
- computer systems built to mimic human intelligence.
- AI refers to the computers having the capabilities of performing tasks like a human.
- AI can do these tasks faster and more accurately than humans.
Benefits
 Enhanced Automation
 Eliminates the Necessity for Humans to Perform Tedious Tasks
 Smart Weather Forecasting
 Next Generation Disaster Response
 Zero Scope for Errors
2. 5G data networks
- 2020 is likely to be the year when 5G really starts to fly
3. Internet of Things (IoT)
- a giant network of connected things and people all of which collect and share data about the
way they are used and about the environment around them.
- Iot made possible for devices like Alexa, Bixby and Google Home to function.
- It can enable predictive maintenance, speed up medical care, improve customer service, and
offer benefits we haven’t even imagined yet.
4. Blockchain
- is a shared, immutable ledger that facilitates the process of recording transactions and tracking
assets in a business network
- a system in which a record of transactions made in bitcoin or another cryptocurrency are
maintained across several computers that are linked in a peer-to-peer network.
5. Virtual Reality and Augmented Reality
- Virtual Reality (VR) immerses the user in an environment while Augment Reality (AR)
enhances their environment.
Benefits of AR and VR
 Make The eLearning Process engaging and exciting
 Create Scenarios That Otherwise Are Impossible To Create
 Allow for Self-Guided Exploration
6. Computer Vision
- involves systems that can identify items, places, objects or people from visual images – those
collected by a camera or sensor.
DIGITAL TECHNOLOGY AND SOCIAL CHANGE
 Schumpeter’s notion of socioeconomic evolution through technological change.
 Creative Destruction
 Introduction to Digital age
 ICT and it’s role in Social Change
 Global Digital Development
 Technological Change
 Social Evolution
Digital Technology
 Stone, Bronze, Iron Age
 Industrial Revolution
 Transformation of Information
Social Change
 Information and Communications Technology gives a chance for people from around the world to
communicate, leading to the success of various advocacies.
DIGITAL REVOLUTION
The Digital Revolution began between the late 1950’s and 1970’s.
It is the development of technology from mechanical and analog to digital. During this time, digital
computers and digital record keeping became the norm. The introduction of digital technology also changed
the way humans communicate, now via computers, cell phones, and the internet.
This revolution led way to the Information Age.
1950’s and 1960’s, many governments, military forces, and other organizations were already using
computers.
Soon after, the computer was introduced for household use and by the 1970’s
By 2015, around 50% of the world had constant internet connection, and ownership rates of smartphones
and commonness of tablet possession have nearly surpassed those of home computers. The ability to
store information has grown exponentially with terabyte storage now being very accessible.
ANALOG VS DIGITAL
Analog and digital signals are used to transmit information, usually through electric signals. In both these
technologies, the information, such as any audio or video, is transformed into electric signals. The
difference between analog and digital technologies is that in analog technology, information is translated
into electric pulses of varying amplitude. In digital technology, translation of information is into binary format
(zero or one) where each bit is representative of two distinct amplitudes.
Digital Age
- Computer Age, Digital Age, or New Media Age
- a historic period in the 21st century characterized by the rapid shift from traditional industry that
the Industrial Revolution brought through industrialization, to an economy based on information technology.
- Time frame in history that the use of digital technology became prevalent and of common use
throughout the world. The digital age began in earnest with the widespread use of the Internet
- The period of the introduction of the personal computer with subsequent technology in providing
the ability to transfer information freely and quickly in human history characterized by the shift from
traditional industry
- captures the ubiquitous nature of computing and the prolific use of technology in almost all aspects
of human activity such that digital interaction is a defining characteristic of human activity.
- The age of widespread use of technological products and networks and technological methods’
over traditional methods in life practices.
- The generation in history during which the use of digital technology became ubiquitous throughout
the world.
Ten Commandments of Digital Age
1. TIME Do Not Be Always On
2. PLACE Live in Person
3. Choice
4. Complexity
5. Scale
6. Identity
7. Social
8. Fact
9. Openness
10. Purpose
ICT ROLE IN SOCIAL CHANGE
- Information and Communications Technology
- Refers to TECHNOLOGIES
- Shows how MODERN SOCIETY WORKS
- EASILY ACCESSED AND USED IN EVERYDAY LIVING
- Allows people to communicate easily which then LEADS TO VARIOUS ADVOCACIES
SOCIAL CHANGE
- ALTERATION OF HUMAN INTERACTIONS and RELATIONSHIPS
- Transforms cultural and social institutions which has a profound and long-term consequences
TUNISIAN REVOLUTION
- DECEMBER 2010
- JASMINE REVOLUTION
- 28-day Civil Resistance Campaign
- High Employment, Food Inflation
- Ousting of long-time president Zine El Abidine Ben Ali
- LACK OF POLITICAL FREEDOM AND POOR LIVING CONDITION
- PLACED SOCIAL MEDIA TO SPREAD AWARENESS AROUND THE GLOBE
WOMEN’s LEARNING PARTNERSHIP
- ELIMINATE MARGINALIZATION OF WOMEN
- GENDER JUSTICE AND HUMAN RIGHTS ADVOCACY
- Advance way of communicating with women around the world in order to promote gender justice
and human rights, particularly in MUSLIMS
- TO EMPOWER WOMEN TO TRANSFORM THEIR FAMILIES, COMMUNITIES AND SOCIETIES
- PROTECT HUMAN RIGHTS, FACILITATE SUSTAINABLE DEVELOPMENT AND PROMOTE
PEACE
ROLE OF ICT
- Cyber-bullying, promotion for feminism, abolition of slavery or industrial revolution
- ICT GIVES AN OPPORTUNITY FOR PEOPLE TO BE AWARE OF THE PROBLEMS IN THE
SOCIETY
- OFFERS PEOPLE THE OPPORTUNITY TO PARTICIPATE AND BE PART OF THESE SOCIAL
CHANGES
WHAT IS DIGITAL DEVELOPMENT?
Digital development or ICT4D (information and communication technology for development)
describe the use and application of technology and digital tools in international development. 
WHY IS ICT4D IMPORTANT?
For many of us, technology is a core part of everyday life. We use phones, tablets and computers
to search for information, navigate to new places, pay bills and connect with our family and
friends.
Technology also plays a key role in international development. While the digital revolution has
not advanced at an equal pace across the world and marginalised groups continue to be excluded,
the introduction of new tools has brought improvements. 
Vital health information has been shared via SMS messages, radio has been used to educate
people about issues like child marriage and television has been an effective medium for sharing
information about social change. 
Today, the number of digital tools at our disposal are endless. Smartphones offer a range of new
ways to communicate, learn and collaborate. Drones can deliver medical supplies to remote
locations. Solar powered devices are in use in the most remote locations, offering power to
people with no access to an electrical grid.
When used smartly, technology can offer us new ways to address the challenges faced by
children. We can make our work more efficient and more transparent with digital data collection
and analytics, and we can ensure the voices of marginalised people reach decision makers and
leaders everywhere
Principles of Digital Development
Design With the User
Successful digital initiatives are rooted in an understanding of user characteristics, needs and
challenges. Starts with getting to know the people you are designing for through conversation,
observation and co-creation. Information gathered through this engagement leads to building,
testing and redesigning tools until they effectively meet user needs.
Understand the Existing Ecosystem
Well-designed initiatives and digital tools consider the particular structures and needs that exist
in each country, region and community. Dedicating time and resources to analyze the ecosystem,
or context where you work, helps to ensure that selected technology tools will be relevant and
sustainable and will not duplicate existing efforts.
Design for Scale
Achieving scale is a goal that has been elusive for many digital development practitioners.
Achieving scale can mean different things in different contexts, but it requires adoption beyond
an initiatives pilot population and often necessitates securing funding or partners that take the
initiative to new communities or regions.
Build for Sustainability
Building sustainable programs, platforms and digital tools is essential to maintain user and
stakeholder support, as well as to maximize long-term impact. Sustainability ensures that user
and stakeholder contributions are not minimized due to interruptions, such as a loss of funding.
Be Data Driven
No amount of data will lead to accelerated impact if it is not used to inform decision making.
When an initiative is data driven, quality information is available to the right people when they
need it, and they are using those data to take action.
Use Open Standards, Open Data, Open Source, and Open Innovation
Too often, scarce public and international development resources are spent investing in new
software code, tools, data collection, content and innovations for sector-specific solutions that
are locked away behind licensing fees, with data only used by and available to specific
initiatives. An open approach to digital development can help to increase collaboration in the
digital development community and avoid duplicating work that has already been done.
Reuse and Improve
Instead of starting from scratch, programs that “reuse and improve” look for ways to adapt and
enhance existing products, resources and approaches. Reuse means assessing what resources are
currently available and using them as they are to meet program goals.
Address Privacy & Security
Addressing privacy and security in digital development involves careful consideration of which
data are collected and how data are acquired, used, stored and shared. Organizations must take
measures to minimize collection and to protect confidential information and identities of
individuals represented in data sets from unauthorized access and manipulation by third parties.
Be Collaborative
Being collaborative means sharing information, insights, strategies and resources across projects,
organizations and sectors, leading to increased efficiency and impact. This Principle brings all
the others together in practice. People working in digital development have a shared vision to
create a better world, and collaboration is essential to making this vision a reality.

WHAT IS TECHNOLOGICAL CHANGE


In economics, a technological change is an increase in the efficiency of a product or process that
results in an increase in output, without an increase in input. In other words, someone invents or
improves a product or process, which is then used to get a bigger reward for the same amount of
work.
The telephone is an example of a product that has undergone a technological change. It has
undergone many different changes over the years that have made it more efficient. Processes or
products, such as the telephone, move through technological change in three stages:
Invention - the creation of a new product or process
Innovation - the application of the invention for the first time
Diffusion - how fast others begin to adopt the innovation
Impacts of Technological Change
We have all likely experienced the impact of technology. Let's take a look at the ways, both good
and bad, technological change has impacted our world:
Creates new products and processes
When telephones were first invented, the object was to be able to verbally communicate with
someone. Due to technological changes, we have multiple ways to communicate using our
phones, such as text, email, or talk.
Increases efficiency, lower costs
Technology makes it possible to perform everyday tasks faster and with less energy on our part.
For instance, some people have a vacuum cleaning robot. Instead of spending 30 minutes
vacuuming, they push a button and go do something else. That's efficiency.
Helps economies evolve
People are able to increase the ways in which they create wealth. It also has a ripple effect. When
one technological change occurs, it changes how we live. With the integration of technology,
societies evolved from traditional hunting and gathering to industrialized. So that fewer people
are growing crops and more are moving into other industries.
A technological change can be defined as an increase in the outputs possible with a given level
of inputs through the processes of invention, innovation and diffusion.
Advatage of technological change
*Hospital
*Education
*Communication
*Transportation
Disadvantage of technological change
*Education
*Less man power
*Mental Health & physical Health
*Laziness
SOCIAL EVOLUTION
This theory claims that societies develop according to one universal order of cultural evolution,
albeit at different rates, which explained why there were different types of society existing in the
world.
Social evolution is what scholars term a broad set of theories that attempt to explain how and
why modern cultures are different from those in the past.
E. B. Tylor, Lewis Henry Morgan, and Herbert Spencer (a sociologist) were the most notable of
the Nineteenth-century social evolutionists.

Edward Burnet Tylor


-Asserted that there is a progressive development of human cultures from the most primitive to
the highest stages of civilization.
-All societies passed through three basic stages of development: from savagery, through
barbarism to civilization.
Lewis Henry Morgan
- Subdivided savagery and barbarism into upper, middle, and lower segments providing
contemporary examples of each of these three stages.
- The stages were based primarily on technological characteristics, but included other
things such as political organization, marriage, family, and religion.
- Postulated that the stages of technological development were associated with a sequence
of different cultural patterns.
- Speculated that the family evolved through six stages
Universal Evolutionary Changes
• SAVAGERY
• BARBARISM
• CIVILIZATION
Lower Savagery
Humans exists through sustenance based on fruit and nuts. Mankind were then living in their
original restricted habitat and subsisting upon fruits and nuts. The commencement of articulate
speech belongs to this period. No exemplification of tribes of mankind in this condition remained
to the historical period.
Middle Savagery
Marked by the acquisition of a fish diet and the discovery of fire. It commenced with the
acquisition of a fish subsistence and a knowledge of the use of fire, and ended with the invention
of the bow and arrow.
Mankind, while in this condition, spread from their original habitat over the greater portion of
the earth’s surface. Among tribes still existing, it will leave in the middle Status of savagery, for
example, the Australians and the greater part of the Polynesians when discovered.
Upper Savagery
Invention of bow and arrow.  It leaves in the Upper Status of Savagery the Athapascan tribes of
the Hudson’s Bay Territory, the tribes of the valley of the Columbia, and certain coast tribes of
North and South America; but with relation to the time of their discovery. This closes the period
of Savagery.
Lower Barbarism
Humans start making pottery. Lower Status, the Indian tribes of the United States east of the
Missouri River, and such tribes of Europe and Asia as practiced the art of pottery, but, were
without domestic animals.
Middle Barbarism
It commenced with the domestication of animals in the Eastern hemisphere, and in the Western
with cultivation by irrigation and with the use of adobe brick and stone in architecture, as shown.
Village Indians of New Mexico, Mexico, Central America and Peru, and such tribes in the
Eastern hemisphere as possessed domestic animals, but were without a knowledge of iron. The
ancient, Britons, although familiar with the use of iron, fairly belong in this connection. The
vicinity of more advanced continental tribes had advanced the arts of life among them far beyond
the state of development of their domestic institutions.

Upper Barbarism
Began with the smelting of iron and use of iron tools. Here civilization begins. This leaves in the
Upper Status, for example, the Grecian tribes of the Homeric age, the Italian tribes shortly before
the founding of Rome, and the Germanic tribes of the time of Cesar.
Civilization
It commenced, as stated, with the use of a phonetic alphabet and the production of literary
records, and divides into Ancient and Modern. 
Phonetic alphabet-  any of various systems of identifying letters of the alphabet by means of code
words in voice communication.
EVOLUTION OF FAMILY IN SIX STAGES
FIRST STAGE-  Human society began as a “horde living in promiscuity,” with no sexual
prohibitions and no real family structure.
SECOND STAGE- Brother-sister mating was permitted.
THIRD STAGE- Group marriage was practiced, but brothers and sisters were not allowed to
mate.
FOURTH STAGE- Evolved during barbarism, was characterized by a loosely paired male and
female who lived with other people.
FIFTH STAGE- Husband-dominant families arose in which the husband could have more than
one wife simultaneously.
SIXTH STAGE- The stage of civilization was distinguished by the monogamous family, with
just one wife and one husband who were relatively equal in status.

Western Societies were put to highest rank of society due to their possession of the most
advanced technology at that time.
Societies at a stage of savagery or barbarism were viewed as inherently inferior to civilized
society.

HERBERT SPENCER
-Social Darwinism (Spencer’s theory of evolution)
-Proposed that war promoted evolution, stating that those societies that conducted more warfare
were the most evolved.
-Coined the phrase “survival of the fittest” and advocated for allowing societies to compete,
thereby allowing the most fit in society to survive.
-opposed social policy that would help the poor.
PSYCHIC UNITY AND THE SUPERIORITY
OF WESTERN CULTURES
Psychic unity is a concept that suggests human minds share similar characteristics all over the
world. This means that all people and their societies will go through the same process of
development.
The assumption of Western superiority was not unusual for the time period. This assumption was
deeply rooted in European colonialism and based on the fact that Western societies had more
technologically sophisticated technology and a belief that Christianity was the true religion.

CONTEMPORARY VIEWS
Contemporary anthropologists view nineteenth-century evolutionism as too simplistic to explain
the development of societies in the world. Here are some examples why:
1. Racist views of human development that were popular at that time.
2. Different levels of intelligence. (Lewis Henry Morgan and E. B. Tylor)

REFERENCES:
https://plan-international.org/approach/digital-development-ict4d?gclid=EAIaIQobChMIhd-
Q7Iuh6wIVTdeWCh0IWQjyEAAYASAAEgJXQ_D_BwE
https://anthropology.ua.edu/theory/social-evolutionism/#:~:text=unilinear%20social
%20evolution%20%E2%80%93%20the%20notion,ultimately%20at%20a%20common%20end.
https://courses.lumenlearning.com/culturalanthropology/chapter/anthropological-theory/
https://www.marxists.org/reference/archive/morgan-lewis/ancient-society/ch01.html
https://www.google.com/search?
q=advantage+and+disadvantage+of+technological+change&oq=advantage+and+disadvantage+o
f+technological+change&aqs=chrome..69i57j0l2.21099j0j4&client=ms-android-
vivo&sourceid=chrome-mobile&ie=UTF-8
PRIVACY AND INFORMATION TECHNOLOGY
1. CONCEPTIONS OF PRIVACY AND THE VALUE OF PRIVACY
Samuel D. Warren and Louis Brandeis wrote their article on privacy in the Harvard Law
Review (Warren & Brandeis 1890) partly in protest against the intrusive activities of the
journalists of those days. They argued that there is a “right to be left alone” based on a
principle of “inviolate personality”. Since the publication of that article, the debate about
privacy has been fuelled by claims regarding the right of individuals to determine the extent to
which others have access to them (Westin 1967) and claims regarding the right of society to
know about individuals. Information being a cornerstone of access to individuals, the privacy
debate has co-evolved with – and in response to – the development of information technology.
It is therefore difficult to conceive of the notions of privacy and discussions about data
protection as separate from the way computers, the Internet, mobile computing and the many
applications of these basic technologies have evolved.

1.1 Constitutional vs. informational privacy


Inspired by subsequent developments in U.S. law, a distinction can be made between
(1) constitutional (or decisional) privacy and (2) tort (or informational) privacy (DeCew 1997).
The first refers to the freedom to make one’s own decisions without interference by others
with regards to matters seen as intimate and personal, such as the decision to use
contraceptives or to have an abortion. The second is concerned with the interest of individuals
in exercising control over access to information about themselves and is most often referred
to as “informational privacy”. Think here, for instance, about information disclosed on
Facebook or other social media. All too easily, such information might be beyond the control of
the individual.

1.1.1 Constitutional Privacy


- was described by Justice William O. Douglas as protecting a zone of privacy
covering the social institution of marriage and the sexual relations of married
persons
- allow individuals to possess obscene matter in their own homes, and to allow
distribution of contraceptive devices to individuals, both married and single
- interracial marriage was outlawed as miscegenation in some places such as
United States, Nazi Germany, and South Africa
1.1.2. Informational Privacy
a. INTRUSION – intentional and unauthorized intrusion into someone’s
private activities
b. PUBLIC DISCLOSURE – intentional publication of embarrassing private
affairs
c. FALSE LIGHT INVASION – publicizing something about the plaintiff that
places the plaintiff in a false position in the public eye; similar to
defamation
d. APPROPRIATION – unauthorized use of someone’s name, personality or
likeness; used for the defendant’s own benefit

1.2 Accounts of the value of privacy

The debates about privacy are almost always revolving around new technology, ranging from
genetics and the extensive study of bio-markers, brain imaging, drones, wearable sensors and
sensor networks, social media, smart phones, closed circuit television, to government
cybersecurity programs, direct marketing, RFID tags, Big Data, head-mounted displays and
search engines. There are basically two reactions to the flood of new technology and its impact
on personal information and privacy: the first reaction, held by many people in IT industry and
in R&D, is that we have zero privacy in the digital age and that there is no way we can protect it,
so we should get used to the new world and get over it (Sprenger 1999). The other reaction is
that our privacy is more important than ever and that we can and we must attempt to protect
it.

In the literature on privacy, there are many competing accounts of the nature and value of
privacy (Negley 1966, Rössler 2005). On one end of the spectrum, reductionist accounts argue
that privacy claims are really about other values and other things that matter from a moral
point of view. According to these views the value of privacy is reducible to these other values or
sources of value (Thomson 1975). Proposals that have been defended along these lines
mention property rights, security, autonomy, intimacy or friendship, democracy, liberty, dignity,
or utility and economic value. Reductionist accounts hold that the importance of privacy should
be explained and its meaning clarified in terms of those other values and sources of value
(Westin 1967). The opposing view holds that privacy is valuable in itself and its value and
importance are not derived from other considerations (see for a discussion Rössler 2004). Views
that construe privacy and the personal sphere of life as a human right would be an example of
this non-reductionist conception.

More recently a type of privacy account has been proposed in relation to new information
technology, which acknowledges that there is a cluster of related moral claims underlying
appeals to privacy, but maintains that there is no single essential core of privacy concerns. This
approach is referred to as cluster accounts (DeCew 1997; Solove 2006; van den Hoven 1999;
Allen 2011; Nissenbaum 2004).
From a descriptive perspective, a recent further addition to the body of privacy accounts are
epistemic accounts, where the notion of privacy is analyzed primarily in terms of knowledge or
other epistemic states. Having privacy means that others don’t know certain private
propositions; lacking privacy means that others do know certain private propositions (Blaauw
2013). An important aspect of this conception of having privacy is that it is seen as a relation
(Rubel 2011; Matheson 2007; Blaauw 2013) with three argument places: a subject (S), a set of
propositions (P) and a set of individuals (I). Here S is the subject who has (a certain degree of)
privacy. P is composed of those propositions the subject wants to keep private (call the
propositions in this set ‘personal propositions’), and I is composed of those individuals with
respect to whom S wants to keep the personal propositions private.

Another distinction that is useful to make is the one between a European and a US American
approach. A bibliometric study suggests that the two approaches are separate in the literature.
The first conceptualizes issues of informational privacy in terms of ‘data protection’, the second
in terms of ‘privacy’ (Heersmink et al. 2011). In discussing the relationship of privacy matters
with technology, the notion of data protection is most helpful, since it leads to a relatively clear
picture of what the object of protection is and by which technical means the data can be
protected. At the same time it invites answers to the question why the data ought to be
protected, pointing to a number of distinctive moral grounds on the basis of which technical,
legal and institutional protection of personal data can be justified. Informational privacy is thus
recast in terms of the protection of personal data (van den Hoven 2008). This account shows
how Privacy, Technology and Data Protection are related, without conflating Privacy and Data
Protection.

1.3 Personal Data

Personal information or data is information or data that is linked or can be linked to individual
persons.

- Example: Person‘s date of birth, sexual preference, whereabouts, religion, but also the
IP address of your computer or metadata pertaining to these kinds of information.

Personal data can also be more implicit in the form of behavioural data.

- Example: social media, like in facebook, youtube, etc.

Personal data can be contrasted with data that is considered sensitive, valuable or important
for other reasons.

- Example: Secret recipes, financial data, or military intelligence.

Data used to secure other information, such as passwords, are not considered here. 
A relevant distinction that has been made in philosophical semantics is that between the
referential and the attributive use of descriptive labels of persons (van den Hoven 2008).

Personal data is defined in the law as data that can be linked with a natural person. 

Two ways in which this link can be made; a referential mode and a non-referential mode.

If the legal definition of personal data is interpreted referentially, much of the data that could
at some point in time be brought to bear on persons would be unprotected;

The processing of this data would not be constrained on moral grounds related to privacy or
personal sphere of life, since it does not “refer” to persons in a straightforward way and
therefore does not constitute “personal data” in a strict sense.

1.4 Moral reasons for protecting personal data

The following types of moral reasons for the protection of personal data and for providing
direct or indirect control over access to those data by others can be distinguished (van den
Hoven 2008):

1. Prevention of harm: Unrestricted access by others to one‘s bank account, profile, social
media account, cloud repositories, characteristics, and whereabouts can be used to
harm the data subject in a variety of ways.
2. Informational inequality: Personal data have become commodities. Individuals are
usually not in a good position to negotiate contracts about the use of their data and do
not have the means to check whether partners live up to the terms of the contract. Data
protection laws, regulation and governance aim at establishing fair conditions for
drafting contracts about personal data transmission and exchange and providing data
subjects with checks and balances, guarantees for redress and means to monitor
compliance with the terms of the contract. Flexible pricing, price targeting and price
gauging, dynamic negotiations are typically undertaken on the basis of asymmetrical
information and great disparities in access to information. Also choice modelling in
marketing, micro-targeting in political campaigns, and nudging in policy implementation
exploit a basic informational inequality of principal and agent.
3. Informational injustice and discrimination: Personal information provided in one
sphere or context (for example, health care) may change its meaning when used in
another sphere or context (such as commercial transactions) and may lead to
discrimination and disadvantages for the individual. This is related to the discussion on
contextual integrity by Nissenbaum (2004) and Walzerian spheres of justice (Van den
Hoven 2008).
4. Encroachment on moral autonomy and human dignity: Lack of privacy may expose
individuals to outside forces that influence their choices and bring them to make
decisions they would not have otherwise made. Mass surveillance leads to a situation
where routinely, systematically, and continuously individuals make choices and
decisions because they know others are watching them. This affects their status as
autonomous beings and has what sometimes is described as a “chilling effect” on them
and on society. Closely related are considerations of violations of respect for persons
and human dignity. The massive accumulation of data relevant to a person‘s identity
(e.g. brain-computer interfaces, identity graphs, digital doubles or digital twins, analysis
of the topology of one‘s social networks) may give rise to the idea that we know a
particular person since there is so much information about her. It can be argued that
being able to figure people out on the basis of their big data constitutes an epistemic
and moral immodesty (Bruynseels & Van den Hoven 2015), which fails to respect the
fact that human beings are subjects with private mental states that have a certain
quality that is inaccessible from an external perspective (third or second person
perspective) – however detailed and accurate that may be. Respecting privacy would
then imply a recognition of this moral phenomenology of human persons, i.e.
recognising that a human being is always more than advanced digital technologies can
deliver.

These considerations all provide good moral reasons for limiting and constraining access to
personal data and providing individuals with control over their data.

1.5 Law, regulation, and indirect control over access


- Processing of personal information requires that its purpose be specified, its use be
limited, individuals be notified and allowed to correct inaccuracies, and the holder of
the data be accountable to oversight authorities (OECD 1980).
- Because it is impossible to guarantee compliance of all types of data processing in all
these areas and applications with these rules and laws in traditional ways, so-called
“privacy-enhancing technologies” (PETs) and identity management systems are
expected to replace human oversight in many cases.
- The challenge with respect to privacy in the twenty-first century is to assure that
technology is designed in such a way that it incorporates privacy requirements in the
software, architecture, infrastructure, and work processes in a way that makes privacy
violations unlikely to occur.

2. THE IMPACT OF INFORMATION TECHNOLOGY ON PRIVACY


The debates about privacy are almost always revolving around new technology, ranging
from genetics and the extensive study of bio-markers, brain imaging, drones, wearable sensors
and sensor networks, social media, smart phones, closed circuit television, to government cyber
security programs, direct marketing, surveillance, RFID tags, big data, head-mounted displays
and search engines. The impact of some of these new technologies, with a particular focus on
information technology, is discussed in this section.

2.1 Developments in information technology

“Information technology” refers to automated systems for storing, processing, and distributing
information. Typically, this involves the use of computers and communication networks. The
amount of information that can be stored or processed in an information system depends on
the technology used. The capacity of the technology has increased rapidly over the past
decades, in accordance with Moore’s law. This holds for storage capacity, processing capacity,
and communication bandwidth. We are now capable of storing and processing data on the
exabyte level.

Memory

It functions as storage and also in processing.

The amount of information that can be stored or processed in an information system depends
on the technology used.

As connectivity increases access to information, it also increases the possibility for agents to act
based on the new sources of information. When these sources contain personal information,
risks of harm, inequality, discrimination, and loss of autonomy easily emerge. For example, your
enemies may have less difficulty finding out where you are, users may be tempted to give up
privacy for perceived benefits in online environments, and employers may use online
information to avoid hiring certain groups of people.

2.2 Internet

The Internet, originally conceived in the 1960s and developed in the 1980s as a scientific
network for exchanging information, was not designed for the purpose of separating
information flows (Michener 1999). The World Wide Web of today was not foreseen, and
neither was the possibility of misuse of the Internet. Social network sites emerged for use
within a community of people who knew each other in real life – at first, mostly in academic
settings – rather than being developed for a worldwide community of users (Ellison 2007). It
was assumed that sharing with close friends would not cause any harm, and privacy and
security only appeared on the agenda when the network grew larger. This means that privacy
concerns often had to be dealt with as add-ons rather than by-design.

A major theme in the discussion of Internet privacy revolves around the use of cookies (Palmer
2005). Cookies are small pieces of data that web sites store on the user’s computer, in order to
enable personalization of the site. However, some cookies can be used to track the user across
multiple web sites (tracking cookies), enabling for example advertisements for a product the
user has recently viewed on a totally different site.

Development of cloud computing

Upload file and store online

Internet service provider

Monitor

2.3 Social media

Social media pose additional challenges. The question is not merely about the moral reasons for
limiting access to information, it is also about the moral reasons for limiting the invitations to
users to submit all kinds of personal information. Social network sites invite the user to
generate more data, to increase the value of the site (“your profile is …% complete”). Users are
tempted to exchange their personal data for the benefits of using services, and provide both
this data and their attention as payment for the services. In addition, users may not even be
aware of what information they are tempted to provide, as in the aforementioned case of the
“like”-button on other sites. Merely limiting the access to personal information does not do
justice to the issues here, and the more fundamental question lies in steering the users’
behaviour of sharing. When the service is free, the data is needed as a form of payment.

Oversharing and Social Media


Oversharing is when people share too much personal information to the public or a stranger. It
can happen both on and offline. However, it is a big problem on social media sites, which make
“putting yourself online” easy.

Examples of Oversharing
Though the result is the same, people overshare on social media in various ways. Here are a
few examples:

 Posting intimate details about your relationships, friendships, family matters, or


personal drama.
 Using social media as a soapbox or a way to vent your emotions.
 Posting photos or videos of things meant to be private.
 Posting embarrassing photos or videos of yourself or others.
 Regularly posting your meals.
 "Checking In" to everywhere you go.
 Posting about whatever you are doing at a given moment, multiple times a day.
 Sharing too much info about and photos of your children.

Why Do We Overshare?

For starters, using social media too much can lead to oversharing. Here are a few other reasons
people may have for sharing too much online:

a. Social Media Encourages It

Social media sites invite users to share everything about their personal lives. It's easy to post a
status update, a photo, an event, or a "check-in" with the click of a button. Unfortunately, this
can lead to an anxious feeling called FOMO, or fear of missing out. FOMO is a lingering feeling
that people are doing things without you, or that things are passing you by. 4

b. To Vent Emotions And Stress

Chances are, we've all seen someone's angry Facebook rant at least once. Because social media
gives everyone a voice and a platform to express it, it can be tempting to "air your dirty
laundry" there.

c. To Let Out Their Frustrations

According to this article from the Huffington Post, "oversharing is fueled by our insecurities."
We tend to care too much what others think and try to make up for what we think other people
judge us for. This leads to some people sharing far too much info.

d. For Attention

Getting likes, comments, shares, and that little boost of attention can give them the feeling of
being famous.1 This can lead to a desire to post things they know will get them noticed, even if
they're "too much."
How to Avoid Oversharing?

Oversharing can become a bad habit. However, breaking that habit is fairly simple. Read on for
a few tips on how to avoid it.

a. Don't Post When You Are Angry

Anger can make you say things you wouldn't have said otherwise. It can make you not really
think about what you're saying. Angry posts may also send a message you didn't mean to send.

So, if you feel like posting that Facebook rant in a fit of anger, don't.

Let yourself wind down before you post. Also, remember that most social media sites have
private messaging. If you need to settle a conflict with someone, message them instead of
commenting publicly.

b. Be Selective

Before you post anything on social media, take some time to decide if posting it is really a good
idea. Use your best judgment to select what info you share on social media. Decide whether it's
too personal, private, or controversial to post. Also, ask yourself: could someone use this
information against me?

c. Remember That Social Media Isn't Your Life…Or Anyone Else's

Social media is a useful tool. However, be careful not to let it take over your life. Don't feel like
you need to "prove" yourself on social media. In real life, most people don't really care about
others' personal lives as much as the internet would have you believe.

Finally, if you feel like these sites are affecting your mental health, try to "disconnect" for a
while and do something outside of the internet.

2.4 Big Data


- also data but with a huge size
- a term used to describe a collection of data that is huge in volume and yet growing
exponentially with time

Examples of Big Data:

Stock Exchange

Social Media (Facebook, Snapchat, Youtube)

Aviation
What is Data?

- Computer data is information processed or stored by a computer


- This information may be in the form of text documents, images, audio clips, software
programs, or other types of data
- a bunch of ones and zeros, known as binary data.
- all computer data is in binary format, it can be created, processed, saved, and stored
digitally.
- This allows data to be transferred from one computer to another using a network
connection or various media devices
- It also does not deteriorate over time or lose quality after being used multiple times.

2.5 Mobile Devices

A mobile device is a computer small enough to hold and operate in the hand. Typically, any
handheld computer device will have an LCD or OLED flatscreen interface, providing a
touchscreen interface with digital buttons and keyboard or physical buttons along with a
physical keyboard
Examples:
Mobile Phones
Mobile Computers
Wearable Computers
IMPACT ON PRIVACY
- Geotracking
- Malicious Applications
- Wi-Fi tracking
- Your camera could be watching you
- Microphone eavesdropping
2.6 Internet of Things

The internet of things is a system of interrelated computing devices, mechanical and digital
machines, objects, animals or people that are provided with unique identifiers and the ability to
transfer data over a network without requiring human-to-human or human-to- computer
interaction.

IoT Security and Privacy Concerns

Although IoT is rapidly growing, it still faces security and privacy issues:
a. Security Risks

- IoT devices are connected to your desktop or laptop. Lack of security increases the risk of your
personal information leaking while the data is collected and transmitted to the IoT device.

- IoT devices are connected with a consumer network. This network is also connected with
other systems. So, if the IoT device contains any security vulnerabilities, it can be harmful to the
consumer’s network. This vulnerability can attack other systems and damage them.

- Sometimes unauthorized people might exploit the security vulnerabilities to create risks to
physical safety.

b. Privacy Risks

- In IoT, devices are interconnected with various hardware and software, so there are obvious
chances of sensitive information leaking through unauthorized manipulation.

- All the devices are transmitting the user’s personal information such as name, address, date of
birth, health cards information, credit card detail and much more without encryption.

Four New Iot Challenges for Privacy and Security

a. Intimacy of devices and data

FUN FACTS ABOUT MILLENNIAL

- 83% Sleep with their phones

- 90% check first thing in morning

- 1 in 3 use in bathroom

- Our smartphones already know: who we know, where we go, what we like

- Will only become more intimate with IoT

- This also means new kinds of intrusive ads, data breaches, accidental data sharing.

b. Physical safety

Today, main problem is data breaches.


Tomorrow, huge potential for many nasty scenarios

Many new kinds of ransomware we haven’t imagined yet.

- Malware that locks people out of their houses

- Malware that turn off thermostats in winter

- Holding people and society virtually hostage

- Autonomous drones or vehicles deliberately crashing into things

- Implanted medical devices giving or receiving fake data

c. Awareness of devices

- More and more devices will be hard to notice

Example: mites “supersensor” under development

d. Complexity and scale

- Lots of unexpected and emergent behaviors

How to address these privacy and security issues?

- Better technical approaches

- Better UX design

- Better developer support

- Better laws, policies and standards

Though there are security and privacy concerns with IoT, it adds values to our lives by allowing
us to manage our daily routine tasks remotely and automatically, and more importantly, it is a
game-changer for industries.

2.7 E-GOVERNMENT

Government- means the body of persons that constitutes the governing authority of a
political unit or organization.
E-Government – electronic government, internet government, digital government,
connected government.

Types of E-Government:
1. G2G (Government to Government)
2. G2C (Government to Citizens)
3. G2E (Government to Employees)
4. G2B (Government to Business)

-The utilization of information and technology (IT), information and communication


technologies (ICT’s) and other web based telecommunication technologies to improve and or
enhance on the efficiency and effectiveness of service delivery in the public sector.
-E-Government promotes and improves broad stakeholders contribution to national and
community development, as well as deepen the governance process.
Kind of activities:
-Pushing information over the internet
-Two-way communications
-Conducting transactions
-Governance
Examples of E-Government:
-Biometric passports
-Online E-Government services
-Voting systems
-A variety of online citizen participation tools and platforms or online access to
recordings of sessions of parliament and government committee meetings.
Disadvantages:
-Lack of equality in public access to the internet
-Reliability of information on the web
-Hidden agendas of government groups that could influence and bias public opinions
-Vulnerability to cyber attacks
-Loss of privacy and hyper-surveillance
-High cost benefit ratio
-False sense of transparency and accountability
Advantages:
-Increased portfolio of public services available in efficient and cost- effective manner
-Government transparency
-Paperless
-Increased citizen awareness
-More accessible
-More interaction between citizens and government
-Speed, efficiency, and convenience
-Public approval.

2.8 SURVEILLANCE
The English noun surveillance comes from the French verb surveiller. It is related to the Latin
term
vigilare with its hint that something vaguely sinister or threatening lurks beyond the
watchtower and town
walls. Still, the threat might be successfully warded off by the vigilant. This ancient meaning is
reflected in
the association many persons still make of surveillance with the activities of police and national
security
agencies. Yet in contemporary society the term has a far wider meaning
The English noun surveillance comes from the French verb surveiller. It is related to the Latin
term
vigilare with its hint that something vaguely sinister or threatening lurks beyond the
watchtower and town
walls. Still, the threat might be successfully warded off by the vigilant. This ancient meaning is
reflected in
the association many persons still make of surveillance with the activities of police and national
security
agencies. Yet in contemporary society the term has a far wider meaning
The English noun surveillance comes from the French verb surveiller. It is related to the Latin
term
vigilare with its hint that something vaguely sinister or threatening lurks beyond the
watchtower and town
walls. Still, the threat might be successfully warded off by the vigilant. This ancient meaning is
reflected in
the association many persons still make of surveillance with the activities of police and national
security
agencies. Yet in contemporary society the term has a far wider meaning

The English noun surveillance comes from the French verb surveiller. It is related to the Latin
term vigilare with its hint that something vaguely sinister or threatening lurks beyond the
watchtower and town walls. Still, the threat might be successfully warded off by the vigilant.
This ancient meaning is reflected in the association many persons still make of surveillance with
the activities of police and national security agencies. Yet in contemporary society the term has
a far wider meaning.

The dictionary, thesaurus, and popular usage suggest a set of related activities: look, observe,
watch, supervise, control, gaze, stare, view, scrutinize, examine, check-out, scan, screen,
inspect, survey, glean, scope, monitor, track, follow, spy, eavesdrop, test, guard.
Surveillance is the monitoring of behavior, activities, or information for the purpose of
information gathering, influencing, managing or directing. This can include observation from a
distance by means of electronic equipment, such as closed-circuit television (CCTV), or
interception of electronically transmitted information, such as Internet traffic.

 Methods
o 1 Computer
o 2 Telephones
o 3 Cameras
o 4 Social network analysis
o 5 Biometric
o 6 Aerial
o 7 Corporate
o 8 Data mining and profiling
o 9 Human operatives
o 10 Satellite imagery
o 11 Identification and credentials
o 12 Wireless Tracking
 12.1 Mobile phones
 12.2 RFID tagging
 12.3 RFID tagging on humans
o 13 Geolocation devices
 13.1 Global Positioning System
o 14 Devices
o 15 Postal services
o 16 Stakeout
o 17 Internet of things

GROUP 6
MATHULOG

BADILLO, Cristian Lloyd


CASIMIRO, Ricardo
CRUZ, Immanuel Fernando
DAQUIGAN, Charles Darwin B.
LAVITORIA, Alexis Mae L.

TOPICS :
 IT APPLICATION IN BUSINESS AND INDUSTRIES
 ASSUMPTIONS AND THEORIES ABOUT WHAT “THE DIGITAL” IS DOING TO
THE INDIVIDUAL, TO THE ENGINEERING INDUSTRY AND TO THE ECONOMY

Technology vs Information Technology


Technology is the application of scientific knowledge to the practical aims of human life or, as it
is sometimes phrased, to the change and manipulation of the human environment. Information
technology (IT) is the use of any computers, storage, networking and other physical
devices, infrastructure and processes to create, process, store, secure and exchange all forms
of electronic data.
Both IT and technology are can driven by software. The difference between the two comes
down to the value that they deliver. A smart phone is primarily valued for the information it
delivers and its typically considered information technology. A spacecraft, train or car is
primarily valued for transportation and is thus seen as technology.

Application of Information Technology in Business


Today's businesses rely more heavily on technology than ever before. From improved
telecommunications to online payment options, most modern businesses could not function as
effectively or efficiently without technology. Even the ability to accept credit or debit card
payments at retail stores requires a complex system of bank exchanges and
telecommunications in order to operate smoothly and reliably. The application of information
technology in management provides opportunities to work outside the office and have
increased access to important information regardless of location.

 Online Advertising
One of the main advantages of information technology in business is the ability for companies
throughout many different industries to advertise their products and services via the Internet.
Almost every website contains advertisements surrounding the site's primary content. Often
these sites feature links from which, with a single click of a mouse or tap on a touchscreen,
people can find information about the company whose ad they have clicked on.
By making information so easily accessible, advertisers may benefit from a much larger volume
of traffic to their own sites and thus greatly increase the chances of someone taking advantage
of their goods or services. Companies are even able to communicate with or reach out to
people all over the world, thereby increasing exposure to their ads without having to pay an
exorbitant amount of additional advertising costs.

 Online Shopping and Money Transfers


Online shopping, bill payments and funds transfers are also key examples of information
technology in business. By allowing consumers to access products and services from any
computer, phone or tablet from home or on the go, companies have made it easier than ever
for people to move money. Shopping online has become so prominent that most major
retailers have online stores to accommodate shoppers. Consumers can buy virtually anything
online from appliances to music. Funds transfers allow investors to track their investments or
manage the accounts of their clients much more quickly.
Most utility companies offer online bill payment options which enable a customer to have their
utility provider draw funds directly from a designated account. This virtually ensures that
customers can avoid late payment fees, as the utility provider is collecting their payments
automatically from clients' accounts. This eliminates the possibility of payments being mailed
and subsequently arriving at the utility provided after the payments due date. As an added
convenience, customers are also spared the expense of envelopes or postage.

 Global Communication
One of the most powerful business tools that technology was provided is the ability to
communicate worldwide almost without restrictions. Video chat apps such as Skype have
greatly increased the efficiency of conference calls by allowing meetings to be conducted
internationally from computers or mobile devices. E-mails and file sharing services allow
documents to be transported instantly across an ocean. Smartphones enable business
associates to communicate even while in transit. Companies with associates in several different
states or countries may now send important updates or information without delay.
 Flexible Work Options
The development of laptops, smartphones and tablets have allowed anyone to work from
anywhere. As technology enables us to make powerful computers smaller, we become free to
travel or even exercise while still monitoring our businesses. People now have much greater
opportunities to work from home, allowing daycare costs to be eliminated. Travel, once a
unfortunate but unavoidable interruption to the flow of work, now affords business
professionals with an opportunity to catch up on aspects of their business while on an airplane
or commuter train. Information can now be sent or received from practically anywhere and at
remarkable speed.

 Physical and Online Data Storage


Whereas once every company had to maintain enormous stockpiles of paper documents, IT's
application in business has helped modern companies minimize the amount of files they must
warehouse. Hard drives are capable of storing terabytes of data and occupy very little physical
space. Cloud storage services like Dropbox, Google Drive and OneDrive can now replace
physical storage devices completely since businesses can access their files through a web
browser or app on a computer or mobile device. Transferring data is also easier due to e-mail,
USB thumb drives and cloud storage services.

Application of Information Technology in Industries

1. Film Industry
All those effects in the world of acting, animation, and editing of the film all on record with
an electronic device which is connected to the computer. Animation was also developed
using the animations created with computer applications. As an example, The process of
making animated films, "Frozen" by using computer.

2. Record Industry
To produce a good sound recording settings and modifications need to be sound with the
computer media, as well as the print of its songs also help with computer system. To print
the album into VCD or DVD need assistance program computers for processing CD burning
so could record sound with very high quality.
3. Telecommunication
 Satellite
If it is reviewed in more depth again, ICT not only to assist in the Administration and
management of the country, even to the IT role in weather forecast and guide the
cruise. If in the past, sailors, referring to the position of the stars in the sky to serve as
the "compass" in yachting. Now, with the weather satellite, a natural phenomenon can
be foretold with more precise and detailed. Through this series of weather satellite
images of clouds can be taken and so on, we can predict the State of the world's
weather. Initializing settings can do before the arrival of floods, hurricanes, tsunamis
and earthquakes to prevent the occurrence of damage to property and living sacrifice.
With the prediction of the phenomenon of El Nino and La Nina is right, we can make
early preparations.
 Country Security
IT has also been a significant contributor in maintaining the peace and security of the
country. The increasingly rampant criminal cases in Malaysia to overcome with the help
of IT. Closed-circuit television (CCTV) widely used and placed in the areas such as banks,
casinos, airports, airfield, and the supermarket.
The CCTV system is the use of video cameras to send a signal to certain places. The
signal has been sent not sent openly, this is in contrast with television. CCTV is used to
monitor the safety of a specific place only.

4. Banking Industries
 Now, with the introduction of E-Commerce, online transaction service then can be
applied. With the availability of ATM, then with the use of the internet makes it easy to
conduct banking services to its customers through INTERNET BANKING and SMS
BANKING.
 Electronic Fund Transfer (EFT) is one example of innovation from the use of the fundamental
internet technologies in the Technology Information System (TSI) in the field of banking.
Examples of products include venues of EFT Cash Self-service (ATM), electronic home banking
(commonly referred to as internet banking), and money transfer network.

 Internet Banking
The services provided to the customer in the form of internet banking bill payment
transactions, account information, transfer funds between accounts, the latest information
about interest rates and the exchange rate of foreign currency, administration of Personal
Identification Number (PIN), addresses or account card, personal data and others, except
taking money or deposit money. Due to money making the ATM service and still require
remittance of money still need help bank branches. This internet banking practice will
obviously change the strategy of the bank in this endeavor. At least there's a new factor that
could affect the assessment of a bank to open a new branch or add ATM. Internet banking
allows the client to make payment-payment online. Internet banking also provides the
accommodation activities of banking through computer networks anytime and anywhere
with fast, easy and safe because it is supported by a strong security system. It is useful to
ensure the security and confidentiality of your data and transactions made by the customer.
In addition, with the internet banking, the bank can increase the speed and range of services
in banking activities.
example:
Assumptions and Theories about what "the digital" is doing to the individual, to
the engineering industry and to the economy

A. Digitalization to Economy

Schumpeter’s Theory of Economic Development


• Creative destruction is the dismantling of an old economy and replacing it with a new
economy through entrepreneurial innovation
• Classic Schumpeter’s analysis ideas:

1. Circular flow in economy:

• Implies continuous activity and no destruction. Economy in stationary state.


• Similar to circulation of blood in an organism.

2. Theory of Economic Development: To make the stationary economy dynamic, changes must
take place in the circular flow system. These changes are brought through innovations.
Schumpeter’s Theory of Economic Development

3. Innovation

- introduced by the entrepreneur with a view to reduce costs and to make profits
– introduction of a new product
– introduction of a new method of production
– opening up of a new market
– conquest of a new source of supply of raw materials
– carrying out of the new way of organization of any industry (like the creation of a monopoly)
Schumpeter’s Theory of Economic Development

4. The role of entrepreneurs in breaking the circular flow in an economy

• An entrepreneur innovates to earn profits.


• Once the innovations become profitable, other entrepreneurs follow it in mass
• Innovations in one field induce other innovations in related fields
• Changes in the form of innovations are the basic element of dynamic process
• When changes take place in the economy, circular flow is disturbed and the development
process starts

B. Digitalization to Individual
Digital learning resources are becoming increasingly common in classrooms. They bring huge
potential for increasing learning in part because they can be constantly updated to meet
students’ needs. Digital resources allow for faster updates than textbooks and offer a wider
variety of sources to all students, including those with disabilities. The benefits of the increased
access to more resources is not only good for students but is also supported by formal theories
and philosophies of learning.

1. Behaviorist philosophy of learning

 According to this philosophy, teaching should emphasize ways to increase desired


behaviors, which can occur through connectionism or operant conditioning.

 Connectionism stresses that learners form associations between sensory experiences


and neural impulses often through trial and error practices.

 One key component of this theory is that learning should involve practice and rewards
that increase desired behaviors, which is what many educational technology applications are
built around. Many apps serve to increase drill practice such as learning a foreign language,
doing math drills or spelling practice, which all help a student’s overall learning.

2. Social Cognitive theory

 is a formal theory of learning that asserts people learn from observing others in their social
environments

 This theory has three key themes:

 Modeling-which refers to learners observing others perform actions in context, is central to


learning, so teachers often incorporate it into their own teaching practice

 self–efficacy - or the belief in one’s own ability to complete tasks and reach goals, is
increased when students are able, to watch a model of a skill and then practice it
themselves

 tutoring and mentoring - provides access to tutors or mentors that many students may not
have otherwise. Students are no longer bound to receiving help solely through their school
community and can communicate with tutors and mentors from all over the world whom
they would not otherwise be able to reach with technology, increasing their learning
potential.

3. Information Processing theory - This theory stresses that individual students have
different information processing capacities, meaning students differ in how much
information they can attend to, encode, retrieve, and retain in their short and long-term
memory.

C. Digitalization to Engineering Industry


The definition of ‘engineer’ as found on Google is the following: ‘A person who designs,
builds, or maintains engines, machines, or structures.’ Secondly, it gives this: ‘A person
who controls an engine, especially on an aircraft or ship’.
Some would argue that these definitions are exceptionally out of date where today’s
engineering jobs are concerned. The industry is changing as we become more reliant on
the benefits of the digital age. With new inventions and start-ups occurring
progressively

Hawkins explained: “The ability to develop software for modern media (apps, web, and
cloud) and connect them to electronics that the same developer has designed exists
more now than from five years ago. This is because technology isn’t static and a move in
technology inevitably means a modification in the type of resources required.”
Technology is definitely not something to be described as ‘static’. If anything, it’s moving
faster than ever. As Hawkins states, with apps and cloud technology growing in
popularity, engineers need to be aware of these technologies and the impact they have
on engineering as a sector.
We want to use computers to handle greater amount of data to increase their
resolution of the design and using IoT data to inform operation of the systems. The
engineering industry will be fully data driven; designing for outcomes rather than
function.”
It’s not just changes in technology that are affecting the engineering industry.
Engineering (and many other industries) are becoming more and more data-driven. This
is a consequence of technology advancement such as IoT and a demand from the
modern-day consumer. Alain Waha, an engineering data scientist  at BuroHappold
Engineering commented: “We see more engineering work done in the form of
computational engineering: writing code to solve the problem, approaching engineering
using systems thinking, and using deep learning to seek insights.”

From an increase in demand for smart consumer tech to providing necessary


environmental equipment, engineering as an industry is being looked at in a whole new
light. Careers in the ever- popular defense sector are also evolving. Building defense
equipment and innovating new technology is still much-needed, however jobs revolving
around data intelligence and surveillance are now entering engineering territory. Being
analytical, logic-driven and perceptive are all personas of an engineer in the defense
sector.

references:
https://bizfluent.com/list-6496451-uses-information-technology-business.html
https://www.hse.ru/mirror/pubs/share/212374107?
fbclid=IwAR1mS8yvVW6gh1oEkAmaFHWEXEc1DAhDBb2DnDYCnr7vScq0j4NZQj1zcVM
https://www.pearsoned.com/digital-learning-access-resources/?
fbclid=IwAR1mS8yvVW6gh1oEkAmaFHWEXEc1DAhDBb2DnDYCnr7vScq0j4NZQj1zcVM#:
~:text=Many%20other%20types%20of%20educational,to%20increase%20their%20self
%2Defficacy.&text=According%20to%20Information%20Processing%20theory,cognitive
%20resources%20to%20learn%20effectively
https://eandt.theiet.org/content/articles/2017/02/how-is-the-engineering-industry-
changing-as-the-digital-age-surges/?
fbclid=IwAR1mS8yvVW6gh1oEkAmaFHWEXEc1DAhDBb2DnDYCnr7vScq0j4NZQj1zcVM
https://eandt.theiet.org/content/articles/2017/02/how-is-the-engineering-industry-
changing-as-the-digital-age-surges/?
fbclid=IwAR1mS8yvVW6gh1oEkAmaFHWEXEc1DAhDBb2DnDYCnr7vScq0j4NZQj1zcVM

You might also like