Group 5 and 6
Group 5 and 6
Humans developed information technology at this time serves as a system for the introduction of the
forms that they know. They describe the information they get on the walls of the cave, about hunting
and prey animals. At this time they began to identify objects that exist in the environment they live and
represent it with the forms which they then painted on cave walls where they live, because of their
ability to speak only about the form of voice grunts and hand gestures as a form of their initial
communication at this time. Further development is created and use the tools that generate sounds
and cues, such as drums, trumpets made of animal horn, or smoke signals as a means of giving warning
of danger.
1) 2900 BC
The use of letters hieroglyph on the ancient
Egyptians. Hierogliph a language of symbols where
each phrase is represented by different symbols.
When combined into one will have a way of
pronunciation and different meanings.
Heiroglyph form of writing and language is more
advanced than Sumerian writing.
2) 500 BC
Papyrus fibers are used as paper. Paper made from papyrus tree fiber that grows around the Nile is a
medium for writing or media information that is more powerful and flexible than the clay tablets that
were previously used as a medium of information.
3) 105 M
The Chinese discovered
kertas.Kertas discovered by the
Chinese at this time is the paper
that you know today. Paper is
made from bamboo fibers are crushed, filtered, washed, then flattened and dried. The invention also
allows the printing system is performed using a carving on a block of wood and covered by the ink or
what we know today with a cap.
b. Of 1830
Augusta Lady Byron wrote the first
computer program in the world to
work with Charles Babbage’s
Analytical engine it uses. The tool is
designed to be able to enter data,
process data, and generate output in
the form of a card. This machine is
known as a form of the first digital
computer, although the way it works
is more mechanical than is digital, 94
years before the first digital computer
ENIAC 1 is formed.
c. In 1837
Samuel Morse developed the telegraph and Morse
code language with Sir Wiliam Cook and Sir Charles
Wheatstone who sent electronically
between two distant parties through the cable
connecting the two places Sending and
receiving of this information can be sent and
received at almost the same time this
invention allows the information can be
accepted and used widely by the people
unhampered by distance and time.
d. In 1861
Moving images are projected onto a screen was
first used as the precursor film is now in ancient
times as the projector is growing step on the
screen. e. During the year 1876 was marked by
figures who developed the Melvyl Dewey
decimal system of writing.
f. In 1877
1) Alexander GrahamBell
invented and developed the first time used the
phone in general.
g. In 1899
Used in tape storage system (tape
the first magnetic storage but at this
time is still analog not digital like the
present. h. During the year 1923 was
marked by Zvorkyn creating the first
television tubes.
i. In 1940
Commencement of the development of science in
the field of information during World War 2, which is used
for the benefit of sending and receiving
of military documents that are stored in the form of
magnetic tape.
j. In
1945
Vannevar Bush developed a coding system using hypertext.Pada this period
the use of hypertext has been developed along with the development of website design is currently
evolving.
l. Year 1948
Researchers at Bell Telephone developed the transistor.
m. Year 1957
1) Jean Hoerni developed the planar transistor. This technology allows the development of millions and
even billions of transistors incorporated into a small piece of silicon crystal.
2) USSR (Russia at the time) as the launching of Sputnik the first artificial earth satellite who served as a
spy. In return the U.S. to form the Advanced Research Projects Agency (ARPA) under the authority of
the Department of Defense to develop science and information technology in the military field.
n. Year 1972
At this time Ray Tomlinson created the first e-mail program that is used to communicate over long
distances using teks.E-mail can be said as electronic mail.
o. Year 1973-1990
The term Internet was introduced in a paper on TCP / IP and then made the development of a network
protocol known as TCP / IP was developed by a group of DARPA.Pada the 1981 National Science
Foundation to develop a backbone called CSNET 56 Kbps capacity for each institution in
pemerintahan.Kemudian in 1986, the IETF developed a server that serves as a coordination tool
including: DARPA, ARPANET, DDN, and Internet Gateway.
Basically, a computer is a programmable electronic device that performs mathematical calculations and
logical operations, especially one that can process, store and retrieve large amounts of information very
quickly. Personal computers are also employed for manipulating text or graphics, accessing the Internet,
or playing games or media.
THE INTERNET
The Internet was invented as a result of researches conducted in the early 1960s by visionary people
like J.C.R. Licklider of MIT.
The latter saw the added value of allowing computers to share information on research and
development in scientific and military fields. That’s why, he proposed a global network of computers in
1962, and moved over to the Defense Advanced Research Projects Agency (DARPA) in late 1962 to head
the work to develop it.
THE WEB
While many people use the terms Internet and the Web interchangeably, they are in fact not
synonymous.
The Internet is a huge network that connects millions of computers together worldwide.
Computers in this network can communicate with any other computer as long as they are connected to
the Internet.
The Web or theWorld Wide Web (WWW), however, is a way of accessing information over the
medium of the Internet. It is an information space or a model that is built on top of the Internet where
documents and other web resources are identified by URLs (Uniform Resource Locator), informally
termed a web address. This space is interlinked by hypertext links, and can be accessed via the Internet.
The World Wide Web was invented by English scientist Tim Berners-Lee in
1989. He wrote the first web browser in 1990 while employed at CERN in
Switzerland.
WEB 1.0, WEB 2.0, WEB 3.0, WEB 4.0 AND WEB 5.0
WEB 1.0
Web 1.0 was the first stage of the World Wide Web’s evolution. Basically, content creators provided
content for the vast majority of users who were only consumers or readers of that content.
It was characterized by static pages (there is no interactivity between users and websites).
It was also characterized by slow connection speed.
The software was very expensive, generally on CDs or DVDs to be installed.
WEB 2.0
Web 2.0 was the next evolution of the Web. It is more sophisticated and is characterized by its social
aspect. Unlike Web 1.0, Web 2.0 is a many-to-many relationship.
WEB 3.0
Web 3.0 is an evolution of the Web as an extension of Web 2.0.
It is also called the Semantic Web. It is characterized by connective intelligence, connecting data,
concepts, applications and ultimately people.
WEB 4.0
Web 4. or the symbiotic web will lead to an interaction between humans and machines in symbiosis.
Machines would be clever on reading the contents of the web and react fast by providing superior
quality content.
WEB 5.0:
Web 5.0 or the emotional web is a version that is still developed underground. The web will interact
with users and will be able to recognize their emotions. So far the web is neutral as far as emotions are
concerned. This will probably change in the future.
Computers in Business :
One of the first and largest applications of computers is keeping and managing business and financial
records.
On a smaller scale, many businesses have replaced cash registers with point-of-sale (POS) terminals.
These POS terminals not only print a sales receipt for the customer but also send information to a
computer database when each item is sold to maintain an inventory of items on hand and items to be
ordered.
Computers have also become very important in modern factories. Computer-controlled robots now do
tasks that are hot, heavy, or hazardous. Robots are also used to do routine, repetitive tasks in which
boredom or fatigue can lead to poor quality work.
Computers in Medicine :
Information technology plays an important role in medicine. For example, a scanner takes a
series of pictures of the body by means of computerized axial tomography (CAT) or magnetic resonance
imaging (MRI).
Computer-aided
design and computer-aided manufacturing programs, often called
CAD/CAM, have led to improved products in many fields, especially where designs tend to be very
detailed. Computer programs make it possible for engineers to analyze designs of complex structures
such as power plants and space stations.
Organizations increasingly
are consolidating their
information needs into a
single, integrated
information system. One
example is SAP, a German
software package that runs on mainframe computers and provides an enterprise-wide solution for
information technologies.
It is a powerful database that enables companies to organize all their data into a single database, then
choose only the program modules or tables they want. The freestanding modules are customized to fit
each customer's needs
Education:
The advent of
Information Technology has
changed the meaning
of the term
“literate”, with
computer literacy being
almost as important as
basic literacy in many cases.
Computer education is
an essential course
at the primary level in most
schools across the world. With
more information getting
digitized every
day, and the internet making it accessible to anyone across the world, students are increasingly relying
on electronic sources of information rather than physical libraries for their needs.
Instructional methodology has also undergone a sea change with use of images, animations,
videos, presentations and e-learning to complement traditional techniques.
Governance:
The concept of e-governance is one of the most novel applications of Information Technology whereby
it is changing the lives of millions across the globe. Computerization of Government activities makes it
easier to supervise and audit, and makes the administration more responsive to the needs of society.
Entertainment:
IT has changed the lifestyle of most people. The
convergence of various technologies has created
various options for entertainment like games,
streaming music and video, digital television
broadcasts, satellite radio, animated movies etc.
which can be accessed with the help of mobile
phones, PDAs, notebook computers or on
television either with a cable connection or
wirelessly using newer-generation WiFi, CDMA
or GPRS technologies.
It also enables financial inclusion through m-commerce and allows people to connect with millions
instantaneously.
The impact of ICT on business is particularly significant. It empowers people to share knowledge
and advice instantaneously and set up an online shop or website at a low cost, dramatically lowering
the barriers to starting a business. As such, it is an important enabler of change and ICT maturity is
closely linked to economic growth.
Advances in technology have always been used by for-profits to increase revenue. However,
government bodies and NGOs have struggled to successfully apply them for social good. An emerging
type of business, the social business, is bridging the gap between the two. ICT is playing a central role in
the emergence and development of social businesses.
These companies are driven by a social cause, but seek financial stability through profit making in order
to further their impact. This combination is allowing them to effectively utilize technology for good. The
impact of ICT infrastructure on social businesses cannot be understated. It has made social impact
affordable, social impact scalable, and enables new ways to connect to and engage with local
communities (a key characteristic of the social
business). I
CT is empowering social businesses to make a real difference in communities around the world,
securing a better future for the digital generations to come.
ICT is developing social businesses in three main ways:
Scalability
ICT infrastructure allows us to connect instantaneously with millions. For social entrepreneurs, this
means that their initiatives aren’t just limited to one community; they can easily reach the people they
want to empower and spread their message far and wide. Many social businesses also utilize ICT
solutions to optimize processes, reduce costs and increase accuracy, enabling the business to be scaled
up faster. For example, Sanergy in Nairobi, Kenya, uses radiofrequency identification sensors to alert
the waste team to when a toilet needs to be emptied. SiembraViva in Medellín, Colombia, is developing
solutions that will allow them to monitor harvests remotely and alert farmers to problems quickly.
Community
To ensure lasting empowerment, social businesses work from within the community. As previously
highlighted, ICT allows social entrepreneurs to continuously connect with the people they wish to
empower in a direct and engaging way. Online channels are also an incredibly powerful way to
broadcast business messages. Although the presence of a social business is very much on the ground
within the community, its story can be told online through webpages and social media, reaching a
global audience.
Access to information:
Possibly the greatest effect of ICT on individuals is the huge increase in access to information and
services that has accompanied the growth of the Internet. Some of the positive aspects of this increased
access are better, and often cheaper, communications, such as VoIP phone and Instant Messaging.
In addition, the use of ICT to access information has brought new opportunities for leisure and
entertainment, the facility to make contacts and form relationships with people around the world, and
the ability to obtain goods and services from a wider range of suppliers.
A. ICT can be used to help people overcome disabilities. e.g. screen magnification or screen
reading software enables partially sighted or blind people to work with ordinary text rather
than Braille.
B. ICT can be used for processes that had previously been out of the reach of most individuals,
e.g. photography, where digital cameras, photo-editing software and high quality printers
have enabled people to produce results that would previously require a photographic studio.
Manual operations being replaced by automation. e.g. robots replacing people on an assembly line. Job
export. e.g. Data processing work being sent to other countries where operating costs are lower.
Multiple workers being replaced by a smaller number who are able to do the same amount of work.
e.g. A worker on a supermarket checkout can serve more customers per hour if a bar-code scanner
linked to a computerized till is used to detect goods instead of the worker having to enter the item and
price manually
The first generation of the Web, Tim Berners-Lee called as read-only or static web.
The birth of Information Age.
Web 1.0 lasted from 1989 to 2005.
CHARACTERISTICS
Social Networking
Content writing and submission
Post blogs
Post comments, reviews, etc.
Information Search
Slide share
Social Bookmarking
ADVANTAGES
3. 3D Graphics
The three-dimensional design is being used extensively in websites and services
in Web 3.0. Museum guides, computer games, ecommerce, geospatial contexts, etc. are
all examples that use 3D graphics.
4. Ubiquity
This web environment must therefore be an "always on" connected world. Users can
meet each other on the web.
The new web is a Web OS - the whole web is a single operating system where
information flows from each point to another system.
In the background, self-learning systems are learning to understand you using artificial
intelligence.
It communicates with users in the same way that people communicate with each other.
Web 4.0 is an open, linked and intelligent web.
The speed and reliability of Web 4.0 are greater than ever.
2.TYPE OF WEBSITES
Personal Websites
Snapchat
Instagram
Google Photos
Dropbox
Photobucket
Flickr
Writer’s / Author’s Websites
A writers website would include a biography, a catalog of published books and works,
perhaps excerpts from some works, links to publications on sites like Amazon.com, a link to the
writer's blog, reviews and comments on the author's publications.
Examples
Goodreads
Veronica Roth (Divergent)
Jennifer Niven (All the Bright Places)
Chuck Wendig (Author, Graphic artist, gamedeveloper)
Community Building Websites
These websites build online communities of people who want to interact with other
people socially or meet people who share their interests.
Example
The Internet or “Net” (network of networks) is the largest computer network in the
world that connects billions of computer users.
The world internet comes from combination between “interconnection” and “Network”.
Network is a collection of computers and devices connected via communication
channels and transmission media allow to share resources (hardware, software, data,
information).
Generally, nobody own internet.
The vast collection of computer networks which from and act as a single huge network
for transport of data and messages across distances which can be anywhere from the
same office to anywhere in the world.
BRIEF HISTORY
Education
Speed Up Daily Tasks
Shopping
Research & Development
Business Promotion and Innovation
Communication
Digital Transactions
Tour & Travel
Entertainment
Job-hunting
ADVANTAGES OF THE INTERNET
Communication
To do research, you need to go through hundreds of books as well as the references and
that was one of the most difficult jobs to do earlier.
Research is one such thing which has got lots of benefit from this evolution of internet.
Education
Education is one of the best things that the internet can provide
There are a number of books, reference books, online help centers, expert’s views and
other study-oriented material on the internet that can make the learning process very
easier as well as a fun learning experience.
Financial Transactions
Financial transaction is the term which is used when there is exchange of money.
With the use of internet in the financial transaction, your work has become a lot easier.
With the ability to do the financial transaction easily over the internet you can purchase
or sell items so easily
DISADVANTAGES OF INTERNET
Theft of Personal Information
The use of Internet for banking, social networking, or other services, often makes our
personal information vulnerable to theft
Unscrupulous hackers can access our sensitive information through unsecured
connections by planting phishing software.
Spamming
Spamming refers to sending unwanted e-mails, which serve no purpose and needlessly
obstruct the computer system
Spammers usually use bots that bombard the receiver with an endless line of
advertisements.
This can prove to be increasingly perplexing, as it keeps getting mixed with our more
important emails
Malware Threats
One of the most annoying problems with the Internet is the ease with which any
malware can infect our computers.
Virus programs are inconspicuous and may get activated simply by clicking a seemingly
harmless link
Computers connected to the Internet are extremely prone to IP targeted virus attacks
that may end up crashing the system completely.
Social Isolation, Obesity and Depression
The biggest problem with having the Internet is, its ability to create rifts between the
real and virtual world.
There is an addiction for everything that pertains to the web and that includes excessive
surfing, online gambling, social networking, and gaming addiction
REFERENCES:
Aghaei, S., Nematbakhsh, M. A., & Farsani, H. K. (2012, January). Retrieved from International
Journal of Web & Semantic Technology (IJWesT) :
https://pdfs.semanticscholar.org/8cb3/93c3229e8f288febfa4dac12a0f6298efb93.pdf
Almeida, F. (2017, November). Research Gate. Retrieved from Research Gate Website:
https://www.researchgate.net/publication/321366810_Concept_and_Dimensions_of_
Web_40#:~:text=Web%204.0%20is%20a%20new,models%2C%20technologies%20and
%20social%20relationships.&text=On%20the%20other%20side%2C
%20terms,computing%22%20are%20not%20often%20used.
Choudhury, N. (2014). Retrieved from International Journal of Computer Science and
Information Technologies:
http://ijcsit.com/docs/Volume%205/vol5issue06/ijcsit20140506265.pdf
Expert System. (2020, April 30). Retrieved from Expert System Website:
https://expertsystem.com/web-3-0/
Flat World Business. (n.d.). Retrieved from Flat World Business Website:
https://flatworldbusiness.wordpress.com/flat-education/previously/web-1-0-vs-web-2-
0-vs-web-3-0-a-bird-eye-on-the-definition/
IT Pedia. (2018, November 12). Retrieved from https://en.itpedia.nl/2018/11/12/web-4-0-the-
internet-of-things-en-ai/
Pandora FMS. (2018, March 5). Retrieved from Pandora FMS Website:
https://pandorafms.com/blog/web-4-0/
https://asianetbroadband.in/importance-of-internet-technology-for-easy-life/
https://www.slideshare.net/sushruth645/internet-ppt-36201939?
fbclid=IwAR3psyotyLUfgg5aHJJvRcZoaVXLeeYwxB7mk283BHhsujDqoYYdF_GpEbE
Group 3
Goal Diggers
Agustin, Juan
Gamurot, Kristine
Lactao Blesie Joyce
Pitacio, Jessica
Samson, Ronnel
CURRENT TRENDS AND EMERGING TECHNOLOGIES
1. Artificial Intelligence (AI)
- computer systems built to mimic human intelligence.
- AI refers to the computers having the capabilities of performing tasks like a human.
- AI can do these tasks faster and more accurately than humans.
Benefits
Enhanced Automation
Eliminates the Necessity for Humans to Perform Tedious Tasks
Smart Weather Forecasting
Next Generation Disaster Response
Zero Scope for Errors
2. 5G data networks
- 2020 is likely to be the year when 5G really starts to fly
3. Internet of Things (IoT)
- a giant network of connected things and people all of which collect and share data about the
way they are used and about the environment around them.
- Iot made possible for devices like Alexa, Bixby and Google Home to function.
- It can enable predictive maintenance, speed up medical care, improve customer service, and
offer benefits we haven’t even imagined yet.
4. Blockchain
- is a shared, immutable ledger that facilitates the process of recording transactions and tracking
assets in a business network
- a system in which a record of transactions made in bitcoin or another cryptocurrency are
maintained across several computers that are linked in a peer-to-peer network.
5. Virtual Reality and Augmented Reality
- Virtual Reality (VR) immerses the user in an environment while Augment Reality (AR)
enhances their environment.
Benefits of AR and VR
Make The eLearning Process engaging and exciting
Create Scenarios That Otherwise Are Impossible To Create
Allow for Self-Guided Exploration
6. Computer Vision
- involves systems that can identify items, places, objects or people from visual images – those
collected by a camera or sensor.
DIGITAL TECHNOLOGY AND SOCIAL CHANGE
Schumpeter’s notion of socioeconomic evolution through technological change.
Creative Destruction
Introduction to Digital age
ICT and it’s role in Social Change
Global Digital Development
Technological Change
Social Evolution
Digital Technology
Stone, Bronze, Iron Age
Industrial Revolution
Transformation of Information
Social Change
Information and Communications Technology gives a chance for people from around the world to
communicate, leading to the success of various advocacies.
DIGITAL REVOLUTION
The Digital Revolution began between the late 1950’s and 1970’s.
It is the development of technology from mechanical and analog to digital. During this time, digital
computers and digital record keeping became the norm. The introduction of digital technology also changed
the way humans communicate, now via computers, cell phones, and the internet.
This revolution led way to the Information Age.
1950’s and 1960’s, many governments, military forces, and other organizations were already using
computers.
Soon after, the computer was introduced for household use and by the 1970’s
By 2015, around 50% of the world had constant internet connection, and ownership rates of smartphones
and commonness of tablet possession have nearly surpassed those of home computers. The ability to
store information has grown exponentially with terabyte storage now being very accessible.
ANALOG VS DIGITAL
Analog and digital signals are used to transmit information, usually through electric signals. In both these
technologies, the information, such as any audio or video, is transformed into electric signals. The
difference between analog and digital technologies is that in analog technology, information is translated
into electric pulses of varying amplitude. In digital technology, translation of information is into binary format
(zero or one) where each bit is representative of two distinct amplitudes.
Digital Age
- Computer Age, Digital Age, or New Media Age
- a historic period in the 21st century characterized by the rapid shift from traditional industry that
the Industrial Revolution brought through industrialization, to an economy based on information technology.
- Time frame in history that the use of digital technology became prevalent and of common use
throughout the world. The digital age began in earnest with the widespread use of the Internet
- The period of the introduction of the personal computer with subsequent technology in providing
the ability to transfer information freely and quickly in human history characterized by the shift from
traditional industry
- captures the ubiquitous nature of computing and the prolific use of technology in almost all aspects
of human activity such that digital interaction is a defining characteristic of human activity.
- The age of widespread use of technological products and networks and technological methods’
over traditional methods in life practices.
- The generation in history during which the use of digital technology became ubiquitous throughout
the world.
Ten Commandments of Digital Age
1. TIME Do Not Be Always On
2. PLACE Live in Person
3. Choice
4. Complexity
5. Scale
6. Identity
7. Social
8. Fact
9. Openness
10. Purpose
ICT ROLE IN SOCIAL CHANGE
- Information and Communications Technology
- Refers to TECHNOLOGIES
- Shows how MODERN SOCIETY WORKS
- EASILY ACCESSED AND USED IN EVERYDAY LIVING
- Allows people to communicate easily which then LEADS TO VARIOUS ADVOCACIES
SOCIAL CHANGE
- ALTERATION OF HUMAN INTERACTIONS and RELATIONSHIPS
- Transforms cultural and social institutions which has a profound and long-term consequences
TUNISIAN REVOLUTION
- DECEMBER 2010
- JASMINE REVOLUTION
- 28-day Civil Resistance Campaign
- High Employment, Food Inflation
- Ousting of long-time president Zine El Abidine Ben Ali
- LACK OF POLITICAL FREEDOM AND POOR LIVING CONDITION
- PLACED SOCIAL MEDIA TO SPREAD AWARENESS AROUND THE GLOBE
WOMEN’s LEARNING PARTNERSHIP
- ELIMINATE MARGINALIZATION OF WOMEN
- GENDER JUSTICE AND HUMAN RIGHTS ADVOCACY
- Advance way of communicating with women around the world in order to promote gender justice
and human rights, particularly in MUSLIMS
- TO EMPOWER WOMEN TO TRANSFORM THEIR FAMILIES, COMMUNITIES AND SOCIETIES
- PROTECT HUMAN RIGHTS, FACILITATE SUSTAINABLE DEVELOPMENT AND PROMOTE
PEACE
ROLE OF ICT
- Cyber-bullying, promotion for feminism, abolition of slavery or industrial revolution
- ICT GIVES AN OPPORTUNITY FOR PEOPLE TO BE AWARE OF THE PROBLEMS IN THE
SOCIETY
- OFFERS PEOPLE THE OPPORTUNITY TO PARTICIPATE AND BE PART OF THESE SOCIAL
CHANGES
WHAT IS DIGITAL DEVELOPMENT?
Digital development or ICT4D (information and communication technology for development)
describe the use and application of technology and digital tools in international development.
WHY IS ICT4D IMPORTANT?
For many of us, technology is a core part of everyday life. We use phones, tablets and computers
to search for information, navigate to new places, pay bills and connect with our family and
friends.
Technology also plays a key role in international development. While the digital revolution has
not advanced at an equal pace across the world and marginalised groups continue to be excluded,
the introduction of new tools has brought improvements.
Vital health information has been shared via SMS messages, radio has been used to educate
people about issues like child marriage and television has been an effective medium for sharing
information about social change.
Today, the number of digital tools at our disposal are endless. Smartphones offer a range of new
ways to communicate, learn and collaborate. Drones can deliver medical supplies to remote
locations. Solar powered devices are in use in the most remote locations, offering power to
people with no access to an electrical grid.
When used smartly, technology can offer us new ways to address the challenges faced by
children. We can make our work more efficient and more transparent with digital data collection
and analytics, and we can ensure the voices of marginalised people reach decision makers and
leaders everywhere
Principles of Digital Development
Design With the User
Successful digital initiatives are rooted in an understanding of user characteristics, needs and
challenges. Starts with getting to know the people you are designing for through conversation,
observation and co-creation. Information gathered through this engagement leads to building,
testing and redesigning tools until they effectively meet user needs.
Understand the Existing Ecosystem
Well-designed initiatives and digital tools consider the particular structures and needs that exist
in each country, region and community. Dedicating time and resources to analyze the ecosystem,
or context where you work, helps to ensure that selected technology tools will be relevant and
sustainable and will not duplicate existing efforts.
Design for Scale
Achieving scale is a goal that has been elusive for many digital development practitioners.
Achieving scale can mean different things in different contexts, but it requires adoption beyond
an initiatives pilot population and often necessitates securing funding or partners that take the
initiative to new communities or regions.
Build for Sustainability
Building sustainable programs, platforms and digital tools is essential to maintain user and
stakeholder support, as well as to maximize long-term impact. Sustainability ensures that user
and stakeholder contributions are not minimized due to interruptions, such as a loss of funding.
Be Data Driven
No amount of data will lead to accelerated impact if it is not used to inform decision making.
When an initiative is data driven, quality information is available to the right people when they
need it, and they are using those data to take action.
Use Open Standards, Open Data, Open Source, and Open Innovation
Too often, scarce public and international development resources are spent investing in new
software code, tools, data collection, content and innovations for sector-specific solutions that
are locked away behind licensing fees, with data only used by and available to specific
initiatives. An open approach to digital development can help to increase collaboration in the
digital development community and avoid duplicating work that has already been done.
Reuse and Improve
Instead of starting from scratch, programs that “reuse and improve” look for ways to adapt and
enhance existing products, resources and approaches. Reuse means assessing what resources are
currently available and using them as they are to meet program goals.
Address Privacy & Security
Addressing privacy and security in digital development involves careful consideration of which
data are collected and how data are acquired, used, stored and shared. Organizations must take
measures to minimize collection and to protect confidential information and identities of
individuals represented in data sets from unauthorized access and manipulation by third parties.
Be Collaborative
Being collaborative means sharing information, insights, strategies and resources across projects,
organizations and sectors, leading to increased efficiency and impact. This Principle brings all
the others together in practice. People working in digital development have a shared vision to
create a better world, and collaboration is essential to making this vision a reality.
Upper Barbarism
Began with the smelting of iron and use of iron tools. Here civilization begins. This leaves in the
Upper Status, for example, the Grecian tribes of the Homeric age, the Italian tribes shortly before
the founding of Rome, and the Germanic tribes of the time of Cesar.
Civilization
It commenced, as stated, with the use of a phonetic alphabet and the production of literary
records, and divides into Ancient and Modern.
Phonetic alphabet- any of various systems of identifying letters of the alphabet by means of code
words in voice communication.
EVOLUTION OF FAMILY IN SIX STAGES
FIRST STAGE- Human society began as a “horde living in promiscuity,” with no sexual
prohibitions and no real family structure.
SECOND STAGE- Brother-sister mating was permitted.
THIRD STAGE- Group marriage was practiced, but brothers and sisters were not allowed to
mate.
FOURTH STAGE- Evolved during barbarism, was characterized by a loosely paired male and
female who lived with other people.
FIFTH STAGE- Husband-dominant families arose in which the husband could have more than
one wife simultaneously.
SIXTH STAGE- The stage of civilization was distinguished by the monogamous family, with
just one wife and one husband who were relatively equal in status.
Western Societies were put to highest rank of society due to their possession of the most
advanced technology at that time.
Societies at a stage of savagery or barbarism were viewed as inherently inferior to civilized
society.
HERBERT SPENCER
-Social Darwinism (Spencer’s theory of evolution)
-Proposed that war promoted evolution, stating that those societies that conducted more warfare
were the most evolved.
-Coined the phrase “survival of the fittest” and advocated for allowing societies to compete,
thereby allowing the most fit in society to survive.
-opposed social policy that would help the poor.
PSYCHIC UNITY AND THE SUPERIORITY
OF WESTERN CULTURES
Psychic unity is a concept that suggests human minds share similar characteristics all over the
world. This means that all people and their societies will go through the same process of
development.
The assumption of Western superiority was not unusual for the time period. This assumption was
deeply rooted in European colonialism and based on the fact that Western societies had more
technologically sophisticated technology and a belief that Christianity was the true religion.
CONTEMPORARY VIEWS
Contemporary anthropologists view nineteenth-century evolutionism as too simplistic to explain
the development of societies in the world. Here are some examples why:
1. Racist views of human development that were popular at that time.
2. Different levels of intelligence. (Lewis Henry Morgan and E. B. Tylor)
REFERENCES:
https://plan-international.org/approach/digital-development-ict4d?gclid=EAIaIQobChMIhd-
Q7Iuh6wIVTdeWCh0IWQjyEAAYASAAEgJXQ_D_BwE
https://anthropology.ua.edu/theory/social-evolutionism/#:~:text=unilinear%20social
%20evolution%20%E2%80%93%20the%20notion,ultimately%20at%20a%20common%20end.
https://courses.lumenlearning.com/culturalanthropology/chapter/anthropological-theory/
https://www.marxists.org/reference/archive/morgan-lewis/ancient-society/ch01.html
https://www.google.com/search?
q=advantage+and+disadvantage+of+technological+change&oq=advantage+and+disadvantage+o
f+technological+change&aqs=chrome..69i57j0l2.21099j0j4&client=ms-android-
vivo&sourceid=chrome-mobile&ie=UTF-8
PRIVACY AND INFORMATION TECHNOLOGY
1. CONCEPTIONS OF PRIVACY AND THE VALUE OF PRIVACY
Samuel D. Warren and Louis Brandeis wrote their article on privacy in the Harvard Law
Review (Warren & Brandeis 1890) partly in protest against the intrusive activities of the
journalists of those days. They argued that there is a “right to be left alone” based on a
principle of “inviolate personality”. Since the publication of that article, the debate about
privacy has been fuelled by claims regarding the right of individuals to determine the extent to
which others have access to them (Westin 1967) and claims regarding the right of society to
know about individuals. Information being a cornerstone of access to individuals, the privacy
debate has co-evolved with – and in response to – the development of information technology.
It is therefore difficult to conceive of the notions of privacy and discussions about data
protection as separate from the way computers, the Internet, mobile computing and the many
applications of these basic technologies have evolved.
The debates about privacy are almost always revolving around new technology, ranging from
genetics and the extensive study of bio-markers, brain imaging, drones, wearable sensors and
sensor networks, social media, smart phones, closed circuit television, to government
cybersecurity programs, direct marketing, RFID tags, Big Data, head-mounted displays and
search engines. There are basically two reactions to the flood of new technology and its impact
on personal information and privacy: the first reaction, held by many people in IT industry and
in R&D, is that we have zero privacy in the digital age and that there is no way we can protect it,
so we should get used to the new world and get over it (Sprenger 1999). The other reaction is
that our privacy is more important than ever and that we can and we must attempt to protect
it.
In the literature on privacy, there are many competing accounts of the nature and value of
privacy (Negley 1966, Rössler 2005). On one end of the spectrum, reductionist accounts argue
that privacy claims are really about other values and other things that matter from a moral
point of view. According to these views the value of privacy is reducible to these other values or
sources of value (Thomson 1975). Proposals that have been defended along these lines
mention property rights, security, autonomy, intimacy or friendship, democracy, liberty, dignity,
or utility and economic value. Reductionist accounts hold that the importance of privacy should
be explained and its meaning clarified in terms of those other values and sources of value
(Westin 1967). The opposing view holds that privacy is valuable in itself and its value and
importance are not derived from other considerations (see for a discussion Rössler 2004). Views
that construe privacy and the personal sphere of life as a human right would be an example of
this non-reductionist conception.
More recently a type of privacy account has been proposed in relation to new information
technology, which acknowledges that there is a cluster of related moral claims underlying
appeals to privacy, but maintains that there is no single essential core of privacy concerns. This
approach is referred to as cluster accounts (DeCew 1997; Solove 2006; van den Hoven 1999;
Allen 2011; Nissenbaum 2004).
From a descriptive perspective, a recent further addition to the body of privacy accounts are
epistemic accounts, where the notion of privacy is analyzed primarily in terms of knowledge or
other epistemic states. Having privacy means that others don’t know certain private
propositions; lacking privacy means that others do know certain private propositions (Blaauw
2013). An important aspect of this conception of having privacy is that it is seen as a relation
(Rubel 2011; Matheson 2007; Blaauw 2013) with three argument places: a subject (S), a set of
propositions (P) and a set of individuals (I). Here S is the subject who has (a certain degree of)
privacy. P is composed of those propositions the subject wants to keep private (call the
propositions in this set ‘personal propositions’), and I is composed of those individuals with
respect to whom S wants to keep the personal propositions private.
Another distinction that is useful to make is the one between a European and a US American
approach. A bibliometric study suggests that the two approaches are separate in the literature.
The first conceptualizes issues of informational privacy in terms of ‘data protection’, the second
in terms of ‘privacy’ (Heersmink et al. 2011). In discussing the relationship of privacy matters
with technology, the notion of data protection is most helpful, since it leads to a relatively clear
picture of what the object of protection is and by which technical means the data can be
protected. At the same time it invites answers to the question why the data ought to be
protected, pointing to a number of distinctive moral grounds on the basis of which technical,
legal and institutional protection of personal data can be justified. Informational privacy is thus
recast in terms of the protection of personal data (van den Hoven 2008). This account shows
how Privacy, Technology and Data Protection are related, without conflating Privacy and Data
Protection.
Personal information or data is information or data that is linked or can be linked to individual
persons.
- Example: Person‘s date of birth, sexual preference, whereabouts, religion, but also the
IP address of your computer or metadata pertaining to these kinds of information.
Personal data can also be more implicit in the form of behavioural data.
Personal data can be contrasted with data that is considered sensitive, valuable or important
for other reasons.
Data used to secure other information, such as passwords, are not considered here.
A relevant distinction that has been made in philosophical semantics is that between the
referential and the attributive use of descriptive labels of persons (van den Hoven 2008).
Personal data is defined in the law as data that can be linked with a natural person.
Two ways in which this link can be made; a referential mode and a non-referential mode.
If the legal definition of personal data is interpreted referentially, much of the data that could
at some point in time be brought to bear on persons would be unprotected;
The processing of this data would not be constrained on moral grounds related to privacy or
personal sphere of life, since it does not “refer” to persons in a straightforward way and
therefore does not constitute “personal data” in a strict sense.
The following types of moral reasons for the protection of personal data and for providing
direct or indirect control over access to those data by others can be distinguished (van den
Hoven 2008):
1. Prevention of harm: Unrestricted access by others to one‘s bank account, profile, social
media account, cloud repositories, characteristics, and whereabouts can be used to
harm the data subject in a variety of ways.
2. Informational inequality: Personal data have become commodities. Individuals are
usually not in a good position to negotiate contracts about the use of their data and do
not have the means to check whether partners live up to the terms of the contract. Data
protection laws, regulation and governance aim at establishing fair conditions for
drafting contracts about personal data transmission and exchange and providing data
subjects with checks and balances, guarantees for redress and means to monitor
compliance with the terms of the contract. Flexible pricing, price targeting and price
gauging, dynamic negotiations are typically undertaken on the basis of asymmetrical
information and great disparities in access to information. Also choice modelling in
marketing, micro-targeting in political campaigns, and nudging in policy implementation
exploit a basic informational inequality of principal and agent.
3. Informational injustice and discrimination: Personal information provided in one
sphere or context (for example, health care) may change its meaning when used in
another sphere or context (such as commercial transactions) and may lead to
discrimination and disadvantages for the individual. This is related to the discussion on
contextual integrity by Nissenbaum (2004) and Walzerian spheres of justice (Van den
Hoven 2008).
4. Encroachment on moral autonomy and human dignity: Lack of privacy may expose
individuals to outside forces that influence their choices and bring them to make
decisions they would not have otherwise made. Mass surveillance leads to a situation
where routinely, systematically, and continuously individuals make choices and
decisions because they know others are watching them. This affects their status as
autonomous beings and has what sometimes is described as a “chilling effect” on them
and on society. Closely related are considerations of violations of respect for persons
and human dignity. The massive accumulation of data relevant to a person‘s identity
(e.g. brain-computer interfaces, identity graphs, digital doubles or digital twins, analysis
of the topology of one‘s social networks) may give rise to the idea that we know a
particular person since there is so much information about her. It can be argued that
being able to figure people out on the basis of their big data constitutes an epistemic
and moral immodesty (Bruynseels & Van den Hoven 2015), which fails to respect the
fact that human beings are subjects with private mental states that have a certain
quality that is inaccessible from an external perspective (third or second person
perspective) – however detailed and accurate that may be. Respecting privacy would
then imply a recognition of this moral phenomenology of human persons, i.e.
recognising that a human being is always more than advanced digital technologies can
deliver.
These considerations all provide good moral reasons for limiting and constraining access to
personal data and providing individuals with control over their data.
“Information technology” refers to automated systems for storing, processing, and distributing
information. Typically, this involves the use of computers and communication networks. The
amount of information that can be stored or processed in an information system depends on
the technology used. The capacity of the technology has increased rapidly over the past
decades, in accordance with Moore’s law. This holds for storage capacity, processing capacity,
and communication bandwidth. We are now capable of storing and processing data on the
exabyte level.
Memory
The amount of information that can be stored or processed in an information system depends
on the technology used.
As connectivity increases access to information, it also increases the possibility for agents to act
based on the new sources of information. When these sources contain personal information,
risks of harm, inequality, discrimination, and loss of autonomy easily emerge. For example, your
enemies may have less difficulty finding out where you are, users may be tempted to give up
privacy for perceived benefits in online environments, and employers may use online
information to avoid hiring certain groups of people.
2.2 Internet
The Internet, originally conceived in the 1960s and developed in the 1980s as a scientific
network for exchanging information, was not designed for the purpose of separating
information flows (Michener 1999). The World Wide Web of today was not foreseen, and
neither was the possibility of misuse of the Internet. Social network sites emerged for use
within a community of people who knew each other in real life – at first, mostly in academic
settings – rather than being developed for a worldwide community of users (Ellison 2007). It
was assumed that sharing with close friends would not cause any harm, and privacy and
security only appeared on the agenda when the network grew larger. This means that privacy
concerns often had to be dealt with as add-ons rather than by-design.
A major theme in the discussion of Internet privacy revolves around the use of cookies (Palmer
2005). Cookies are small pieces of data that web sites store on the user’s computer, in order to
enable personalization of the site. However, some cookies can be used to track the user across
multiple web sites (tracking cookies), enabling for example advertisements for a product the
user has recently viewed on a totally different site.
Monitor
Social media pose additional challenges. The question is not merely about the moral reasons for
limiting access to information, it is also about the moral reasons for limiting the invitations to
users to submit all kinds of personal information. Social network sites invite the user to
generate more data, to increase the value of the site (“your profile is …% complete”). Users are
tempted to exchange their personal data for the benefits of using services, and provide both
this data and their attention as payment for the services. In addition, users may not even be
aware of what information they are tempted to provide, as in the aforementioned case of the
“like”-button on other sites. Merely limiting the access to personal information does not do
justice to the issues here, and the more fundamental question lies in steering the users’
behaviour of sharing. When the service is free, the data is needed as a form of payment.
Examples of Oversharing
Though the result is the same, people overshare on social media in various ways. Here are a
few examples:
Why Do We Overshare?
For starters, using social media too much can lead to oversharing. Here are a few other reasons
people may have for sharing too much online:
Social media sites invite users to share everything about their personal lives. It's easy to post a
status update, a photo, an event, or a "check-in" with the click of a button. Unfortunately, this
can lead to an anxious feeling called FOMO, or fear of missing out. FOMO is a lingering feeling
that people are doing things without you, or that things are passing you by. 4
Chances are, we've all seen someone's angry Facebook rant at least once. Because social media
gives everyone a voice and a platform to express it, it can be tempting to "air your dirty
laundry" there.
According to this article from the Huffington Post, "oversharing is fueled by our insecurities."
We tend to care too much what others think and try to make up for what we think other people
judge us for. This leads to some people sharing far too much info.
d. For Attention
Getting likes, comments, shares, and that little boost of attention can give them the feeling of
being famous.1 This can lead to a desire to post things they know will get them noticed, even if
they're "too much."
How to Avoid Oversharing?
Oversharing can become a bad habit. However, breaking that habit is fairly simple. Read on for
a few tips on how to avoid it.
Anger can make you say things you wouldn't have said otherwise. It can make you not really
think about what you're saying. Angry posts may also send a message you didn't mean to send.
So, if you feel like posting that Facebook rant in a fit of anger, don't.
Let yourself wind down before you post. Also, remember that most social media sites have
private messaging. If you need to settle a conflict with someone, message them instead of
commenting publicly.
b. Be Selective
Before you post anything on social media, take some time to decide if posting it is really a good
idea. Use your best judgment to select what info you share on social media. Decide whether it's
too personal, private, or controversial to post. Also, ask yourself: could someone use this
information against me?
Social media is a useful tool. However, be careful not to let it take over your life. Don't feel like
you need to "prove" yourself on social media. In real life, most people don't really care about
others' personal lives as much as the internet would have you believe.
Finally, if you feel like these sites are affecting your mental health, try to "disconnect" for a
while and do something outside of the internet.
Stock Exchange
Aviation
What is Data?
A mobile device is a computer small enough to hold and operate in the hand. Typically, any
handheld computer device will have an LCD or OLED flatscreen interface, providing a
touchscreen interface with digital buttons and keyboard or physical buttons along with a
physical keyboard
Examples:
Mobile Phones
Mobile Computers
Wearable Computers
IMPACT ON PRIVACY
- Geotracking
- Malicious Applications
- Wi-Fi tracking
- Your camera could be watching you
- Microphone eavesdropping
2.6 Internet of Things
The internet of things is a system of interrelated computing devices, mechanical and digital
machines, objects, animals or people that are provided with unique identifiers and the ability to
transfer data over a network without requiring human-to-human or human-to- computer
interaction.
Although IoT is rapidly growing, it still faces security and privacy issues:
a. Security Risks
- IoT devices are connected to your desktop or laptop. Lack of security increases the risk of your
personal information leaking while the data is collected and transmitted to the IoT device.
- IoT devices are connected with a consumer network. This network is also connected with
other systems. So, if the IoT device contains any security vulnerabilities, it can be harmful to the
consumer’s network. This vulnerability can attack other systems and damage them.
- Sometimes unauthorized people might exploit the security vulnerabilities to create risks to
physical safety.
b. Privacy Risks
- In IoT, devices are interconnected with various hardware and software, so there are obvious
chances of sensitive information leaking through unauthorized manipulation.
- All the devices are transmitting the user’s personal information such as name, address, date of
birth, health cards information, credit card detail and much more without encryption.
- 1 in 3 use in bathroom
- Our smartphones already know: who we know, where we go, what we like
- This also means new kinds of intrusive ads, data breaches, accidental data sharing.
b. Physical safety
c. Awareness of devices
- Better UX design
Though there are security and privacy concerns with IoT, it adds values to our lives by allowing
us to manage our daily routine tasks remotely and automatically, and more importantly, it is a
game-changer for industries.
2.7 E-GOVERNMENT
Government- means the body of persons that constitutes the governing authority of a
political unit or organization.
E-Government – electronic government, internet government, digital government,
connected government.
Types of E-Government:
1. G2G (Government to Government)
2. G2C (Government to Citizens)
3. G2E (Government to Employees)
4. G2B (Government to Business)
2.8 SURVEILLANCE
The English noun surveillance comes from the French verb surveiller. It is related to the Latin
term
vigilare with its hint that something vaguely sinister or threatening lurks beyond the
watchtower and town
walls. Still, the threat might be successfully warded off by the vigilant. This ancient meaning is
reflected in
the association many persons still make of surveillance with the activities of police and national
security
agencies. Yet in contemporary society the term has a far wider meaning
The English noun surveillance comes from the French verb surveiller. It is related to the Latin
term
vigilare with its hint that something vaguely sinister or threatening lurks beyond the
watchtower and town
walls. Still, the threat might be successfully warded off by the vigilant. This ancient meaning is
reflected in
the association many persons still make of surveillance with the activities of police and national
security
agencies. Yet in contemporary society the term has a far wider meaning
The English noun surveillance comes from the French verb surveiller. It is related to the Latin
term
vigilare with its hint that something vaguely sinister or threatening lurks beyond the
watchtower and town
walls. Still, the threat might be successfully warded off by the vigilant. This ancient meaning is
reflected in
the association many persons still make of surveillance with the activities of police and national
security
agencies. Yet in contemporary society the term has a far wider meaning
The English noun surveillance comes from the French verb surveiller. It is related to the Latin
term vigilare with its hint that something vaguely sinister or threatening lurks beyond the
watchtower and town walls. Still, the threat might be successfully warded off by the vigilant.
This ancient meaning is reflected in the association many persons still make of surveillance with
the activities of police and national security agencies. Yet in contemporary society the term has
a far wider meaning.
The dictionary, thesaurus, and popular usage suggest a set of related activities: look, observe,
watch, supervise, control, gaze, stare, view, scrutinize, examine, check-out, scan, screen,
inspect, survey, glean, scope, monitor, track, follow, spy, eavesdrop, test, guard.
Surveillance is the monitoring of behavior, activities, or information for the purpose of
information gathering, influencing, managing or directing. This can include observation from a
distance by means of electronic equipment, such as closed-circuit television (CCTV), or
interception of electronically transmitted information, such as Internet traffic.
Methods
o 1 Computer
o 2 Telephones
o 3 Cameras
o 4 Social network analysis
o 5 Biometric
o 6 Aerial
o 7 Corporate
o 8 Data mining and profiling
o 9 Human operatives
o 10 Satellite imagery
o 11 Identification and credentials
o 12 Wireless Tracking
12.1 Mobile phones
12.2 RFID tagging
12.3 RFID tagging on humans
o 13 Geolocation devices
13.1 Global Positioning System
o 14 Devices
o 15 Postal services
o 16 Stakeout
o 17 Internet of things
GROUP 6
MATHULOG
TOPICS :
IT APPLICATION IN BUSINESS AND INDUSTRIES
ASSUMPTIONS AND THEORIES ABOUT WHAT “THE DIGITAL” IS DOING TO
THE INDIVIDUAL, TO THE ENGINEERING INDUSTRY AND TO THE ECONOMY
Online Advertising
One of the main advantages of information technology in business is the ability for companies
throughout many different industries to advertise their products and services via the Internet.
Almost every website contains advertisements surrounding the site's primary content. Often
these sites feature links from which, with a single click of a mouse or tap on a touchscreen,
people can find information about the company whose ad they have clicked on.
By making information so easily accessible, advertisers may benefit from a much larger volume
of traffic to their own sites and thus greatly increase the chances of someone taking advantage
of their goods or services. Companies are even able to communicate with or reach out to
people all over the world, thereby increasing exposure to their ads without having to pay an
exorbitant amount of additional advertising costs.
Global Communication
One of the most powerful business tools that technology was provided is the ability to
communicate worldwide almost without restrictions. Video chat apps such as Skype have
greatly increased the efficiency of conference calls by allowing meetings to be conducted
internationally from computers or mobile devices. E-mails and file sharing services allow
documents to be transported instantly across an ocean. Smartphones enable business
associates to communicate even while in transit. Companies with associates in several different
states or countries may now send important updates or information without delay.
Flexible Work Options
The development of laptops, smartphones and tablets have allowed anyone to work from
anywhere. As technology enables us to make powerful computers smaller, we become free to
travel or even exercise while still monitoring our businesses. People now have much greater
opportunities to work from home, allowing daycare costs to be eliminated. Travel, once a
unfortunate but unavoidable interruption to the flow of work, now affords business
professionals with an opportunity to catch up on aspects of their business while on an airplane
or commuter train. Information can now be sent or received from practically anywhere and at
remarkable speed.
1. Film Industry
All those effects in the world of acting, animation, and editing of the film all on record with
an electronic device which is connected to the computer. Animation was also developed
using the animations created with computer applications. As an example, The process of
making animated films, "Frozen" by using computer.
2. Record Industry
To produce a good sound recording settings and modifications need to be sound with the
computer media, as well as the print of its songs also help with computer system. To print
the album into VCD or DVD need assistance program computers for processing CD burning
so could record sound with very high quality.
3. Telecommunication
Satellite
If it is reviewed in more depth again, ICT not only to assist in the Administration and
management of the country, even to the IT role in weather forecast and guide the
cruise. If in the past, sailors, referring to the position of the stars in the sky to serve as
the "compass" in yachting. Now, with the weather satellite, a natural phenomenon can
be foretold with more precise and detailed. Through this series of weather satellite
images of clouds can be taken and so on, we can predict the State of the world's
weather. Initializing settings can do before the arrival of floods, hurricanes, tsunamis
and earthquakes to prevent the occurrence of damage to property and living sacrifice.
With the prediction of the phenomenon of El Nino and La Nina is right, we can make
early preparations.
Country Security
IT has also been a significant contributor in maintaining the peace and security of the
country. The increasingly rampant criminal cases in Malaysia to overcome with the help
of IT. Closed-circuit television (CCTV) widely used and placed in the areas such as banks,
casinos, airports, airfield, and the supermarket.
The CCTV system is the use of video cameras to send a signal to certain places. The
signal has been sent not sent openly, this is in contrast with television. CCTV is used to
monitor the safety of a specific place only.
4. Banking Industries
Now, with the introduction of E-Commerce, online transaction service then can be
applied. With the availability of ATM, then with the use of the internet makes it easy to
conduct banking services to its customers through INTERNET BANKING and SMS
BANKING.
Electronic Fund Transfer (EFT) is one example of innovation from the use of the fundamental
internet technologies in the Technology Information System (TSI) in the field of banking.
Examples of products include venues of EFT Cash Self-service (ATM), electronic home banking
(commonly referred to as internet banking), and money transfer network.
Internet Banking
The services provided to the customer in the form of internet banking bill payment
transactions, account information, transfer funds between accounts, the latest information
about interest rates and the exchange rate of foreign currency, administration of Personal
Identification Number (PIN), addresses or account card, personal data and others, except
taking money or deposit money. Due to money making the ATM service and still require
remittance of money still need help bank branches. This internet banking practice will
obviously change the strategy of the bank in this endeavor. At least there's a new factor that
could affect the assessment of a bank to open a new branch or add ATM. Internet banking
allows the client to make payment-payment online. Internet banking also provides the
accommodation activities of banking through computer networks anytime and anywhere
with fast, easy and safe because it is supported by a strong security system. It is useful to
ensure the security and confidentiality of your data and transactions made by the customer.
In addition, with the internet banking, the bank can increase the speed and range of services
in banking activities.
example:
Assumptions and Theories about what "the digital" is doing to the individual, to
the engineering industry and to the economy
A. Digitalization to Economy
2. Theory of Economic Development: To make the stationary economy dynamic, changes must
take place in the circular flow system. These changes are brought through innovations.
Schumpeter’s Theory of Economic Development
3. Innovation
- introduced by the entrepreneur with a view to reduce costs and to make profits
– introduction of a new product
– introduction of a new method of production
– opening up of a new market
– conquest of a new source of supply of raw materials
– carrying out of the new way of organization of any industry (like the creation of a monopoly)
Schumpeter’s Theory of Economic Development
B. Digitalization to Individual
Digital learning resources are becoming increasingly common in classrooms. They bring huge
potential for increasing learning in part because they can be constantly updated to meet
students’ needs. Digital resources allow for faster updates than textbooks and offer a wider
variety of sources to all students, including those with disabilities. The benefits of the increased
access to more resources is not only good for students but is also supported by formal theories
and philosophies of learning.
One key component of this theory is that learning should involve practice and rewards
that increase desired behaviors, which is what many educational technology applications are
built around. Many apps serve to increase drill practice such as learning a foreign language,
doing math drills or spelling practice, which all help a student’s overall learning.
is a formal theory of learning that asserts people learn from observing others in their social
environments
self–efficacy - or the belief in one’s own ability to complete tasks and reach goals, is
increased when students are able, to watch a model of a skill and then practice it
themselves
tutoring and mentoring - provides access to tutors or mentors that many students may not
have otherwise. Students are no longer bound to receiving help solely through their school
community and can communicate with tutors and mentors from all over the world whom
they would not otherwise be able to reach with technology, increasing their learning
potential.
3. Information Processing theory - This theory stresses that individual students have
different information processing capacities, meaning students differ in how much
information they can attend to, encode, retrieve, and retain in their short and long-term
memory.
Hawkins explained: “The ability to develop software for modern media (apps, web, and
cloud) and connect them to electronics that the same developer has designed exists
more now than from five years ago. This is because technology isn’t static and a move in
technology inevitably means a modification in the type of resources required.”
Technology is definitely not something to be described as ‘static’. If anything, it’s moving
faster than ever. As Hawkins states, with apps and cloud technology growing in
popularity, engineers need to be aware of these technologies and the impact they have
on engineering as a sector.
We want to use computers to handle greater amount of data to increase their
resolution of the design and using IoT data to inform operation of the systems. The
engineering industry will be fully data driven; designing for outcomes rather than
function.”
It’s not just changes in technology that are affecting the engineering industry.
Engineering (and many other industries) are becoming more and more data-driven. This
is a consequence of technology advancement such as IoT and a demand from the
modern-day consumer. Alain Waha, an engineering data scientist at BuroHappold
Engineering commented: “We see more engineering work done in the form of
computational engineering: writing code to solve the problem, approaching engineering
using systems thinking, and using deep learning to seek insights.”
references:
https://bizfluent.com/list-6496451-uses-information-technology-business.html
https://www.hse.ru/mirror/pubs/share/212374107?
fbclid=IwAR1mS8yvVW6gh1oEkAmaFHWEXEc1DAhDBb2DnDYCnr7vScq0j4NZQj1zcVM
https://www.pearsoned.com/digital-learning-access-resources/?
fbclid=IwAR1mS8yvVW6gh1oEkAmaFHWEXEc1DAhDBb2DnDYCnr7vScq0j4NZQj1zcVM#:
~:text=Many%20other%20types%20of%20educational,to%20increase%20their%20self
%2Defficacy.&text=According%20to%20Information%20Processing%20theory,cognitive
%20resources%20to%20learn%20effectively
https://eandt.theiet.org/content/articles/2017/02/how-is-the-engineering-industry-
changing-as-the-digital-age-surges/?
fbclid=IwAR1mS8yvVW6gh1oEkAmaFHWEXEc1DAhDBb2DnDYCnr7vScq0j4NZQj1zcVM
https://eandt.theiet.org/content/articles/2017/02/how-is-the-engineering-industry-
changing-as-the-digital-age-surges/?
fbclid=IwAR1mS8yvVW6gh1oEkAmaFHWEXEc1DAhDBb2DnDYCnr7vScq0j4NZQj1zcVM