Page views!

Wednesday, 9 September 2015

An Introduction to Strand 1!

ITGS strand criteria definitions:

1)  Reliability and integrity
    • Reliability is how accurate the data on an IT system is. It is also how functional the hardware and software are. If the data is inaccurate then the IT system is not reliable, and if the hardware and software don't function properly, for example: a word document does not save properly, then the IT system is unreliable as well, as they can cause harm to the user.
    • Integrity is basically the act of protecting the data on an IT system. If the data on an IT system has been inputed incorrectly then the IT system lacks integrity. However if the data has been deleted or altered for  a malicious purpose then the IT system has no integrity

2)  Security
    • Security is the act of protecting IT systems from unauthorised use. Examples of this are: Security systems designed to protect the information on the IT systems from hackers, such as but not limited to firewall, automatic filtering software. Another example of this would be restricting access to personal data (religious/political views) from the employees working at the company.

3)  Privacy and anonymity
    • Privacy is the ability for people to choose how much information they provide to be stored on an IT system, for example: they can choose to provide only information which is necessary but not information which is optional. Anonymity on the other hand is when a person uses extreme privacy cyber-mob someone else.

4)  Intellectual property
    • Intellectual property is anything in the form of works of art, ideas, writings, and other creations. Intellectual property is protected by equality. Unfortunately, IT systems allow the plagiarism of intellectual property.  

5)  Authenticity 
    • Authenticity is making sure that the person accessing the IT systems is a person who's authorised to do so. There are several ways of authenticating that the person using the IT systems is the correct person. A simple method is the use of a password and username, a more complex is the use of biometric systems.

6)  The digital divide and equality of access
    • The evolution of IT has led to the prominence of it in our everyday lives. However, some people come from lower economic backgrounds, hence they are not able to catch up with technology as much as those who are financially able. This can lead to the poorer having a disadvantage in comparison to the rich as they will not be able to find many jobs since society demands the use of IT systems. This creates a digital divide within a community. 

7) Surveillance 
    • Surveillance is used to monitor the activities of people. One use of this technology is to monitor employees, which makes sure that they follow the company’s policies. However, in some extreme cases, this surveillance may become a breach of personal privacy. To what extent should surveillance be allowed?

8)  Globalisation and cultural diversity 
    • Globalisation is basically the decrease in the magnitude of geographical, political, economical, etc.. news. As technology becomes more and more common, an earthquake with a magnitude of 7.1 which kills thousands of civilians becomes ordinary news. Although this leads to the increase in the number of global citizens, it may lead to the loss of some cultures or languages.

9)  Policies
    • Policies are basically laws which promote appropriate and discourage inappropriate uses of IT systems. Policies can be developed by companies, governments, individuals and so on. 

10)  Standards and protocols 
    • Standards and protocols are simply technical rules that IT systems must follow to allow compatibility between different IT systems.

11)  People and machines
    • It systems have many pros, many of those being: available easily, easy access (for most people), allow complex errands to be completed without risking human life. However, the ultimate evolution of technology may have negative impacts. One such impact is the addiction to computer systems. Since more and more IT systems are being introduced daily, humans adapt and become lazy, allowing IT to take control of their lives. However, when they try to complete a task without the use of IT they find it impossible. A good example of this is the implementation of iPads in schools. Although it is easy to use, in a few years children will forget to write and hence they will forger to write, and what happens when their device is damaged and cannot be used? 

12)  Digital citizenship 


    • A digital citizen should use IT systems ethically, legally and with a responsibility of their actions.

No comments:

Post a Comment