Module 1 Flashcards
use of different communication technologies such as phones & Internet. to locate, save, send and edit information
Information and Communication Technology
Enumerate the general Positive Impacts of ICT
Access to information, improved access to education, new tools, new opportunities
cheaper communication, more opportunities for leisure and entertainment, interactions with people all over the world, ability to obtain goods and services from a wider range of sources
Access to information
distance learning, online tutorials, new learning methods VR & interactive multimedia, job opportunities virtual jobs in the communications industry
Improved access to education
Photo or video editing software, printers, laptops, assistive technology for those with disabilities
New tools, new opportunities
Enumerate the General Negative Impacts of ICT
Job loss, reduced personal interaction, reduced physical activity
manual work replaced by automation with the ability to do the work of multiple people
Job loss
lack of social interaction due to the replacement of human workforce isolates & often becomes a source of unhappiness
Reduced personal interaction
Less manual work/adoption of a sedentary lifestyle may lead to health problems (obesity, heart disease, eyestrain, etc.)
Reduced physical activity
Enumerate the positive impacts of ICT in Organizations
Communication, information management, security
cost saving with automatized actions (payment, worldwide website reach, flexible response)
Communication
Access to customer info : better advertising, business, increased income, basis for decision making
Information Management
Fingerprint, iris or facial recognition, or data encryption like 2-factor authentication
Security
Enumerate the negative impacts of ICT in Organizations
Cost, competition, security
Expensive hardware/software, and quick improvements in tech may make it hard to keep up with
Cost
Loss of customers & income from other competitors offering similar services at a lower price
Competition
Hacking, viruses, & malware can endanger safe internet connections and secure data
Security
Increased access to information leads to increased opportunities in education, communication improvement, and the chance to participate in a society,
Positive Impact of ICT in Society
Increased access to information can also cause a digital divide, reducing levels of education and understanding from the incorrect/misleading information that further causes moral and ethical problems.
Negative Impacts of ICT in Society
When the World Wide Was made, it used to be static/flat pages/stationary pages; cannot be manipulated by users.
Web 1.0
Added dynamic web pages, displays different content for different users like social networking sites, allowed users to interact instead of just reading, and may be able to comment/make an account. Allows usage of web browsers instead of an operating system
Web 2.0
Enumerate the Features of Web 2.0
Folksonomy, Rich User Experience, Long Tail, User Participation, Software as Service, Mass Participation
ability of users to categorize/flassify info by keywords (tagging)- hashtags in social media platforms
Folksonomy
content is dynamic/responsive to user’s input. Example: Logging into an account modifies what you see on the website.
Rich User Experience
Services are offered on demand rather than on a one-time purchase. Time-based pricing might be better than file-size-based pricing and vice versa
Long Tail
users are also able to put content on a website, like posts, comments, reviews, and evaluation
User participation
Renting instead of purchasing - like monthly payments to google drive, google docs, compared to buying microsoft word.
Software as service
diverse information sharing from universal web access to people from various cultures
Mass Participation
a movement led by the World Wide Web Consortium, aims to have machines/servers understand user preferences to deliver web content specifically targeting the user
Web 3.0
Another name for Web 3.0
Semantic Web
Enumerate the several problems of Web 3.0
Compatability, security, vastness, vagueness, logic
Enumerate the ICT trends
Convergence, social media, mobile technologies, assistive media
synergy of advancements to work on a similar goal
Convergence
allows users to create, discuss, exchange user-generated content through social networks, bookmarking sites, social news, media sharing, microblogging, and blogs and forums
Social Media
smartphones and tablets’ capability to do personal computer activities, through operating systems such as iOS & Android, WobOS, Windows Mobile
Mobile Technologies
helps people who have visual/reading impairments
Assistive Media
Elements of a well-conceptualized website
Usefulness of website, Adherence to Functionality, Usability, Influence, Visual Design
it’s important to identify the target audience to show the…?
Usefelness of website
comes with the challenge to pay attention to accessibility. Design must have its function
Adherence to Functionality
Measure of the simplicity for a user to manipulate the site and the convenience to use on the long term
Usability
Maximizing the functionality of the website for advertising to influence customers
Influence
content must contribute to the aesthetic of the website to contribute to user experience/online environment
Visual Design
AKA Malicious software, like viruses, worms, trojans, spywares, adwares
Malware
unwanted emails from bots and advertisements that can be used to send malware without being detected
Spam
acquiring sensitive personal info like passwords and credit; sending malicious emails to individuals by impersonation to get personal information card details
Phishing
Programs that induce security fraud by using exploits of a system to scare/deceive the user into downloading a program with the promises of removing malware on the system, but ends up installing more malware. Sometimes it ends up in ransomware. Its different names include scareware, fraudware, rogue scanner, and rogue antivirus.
Rogue Security Software
monitoring software designed to record a user’s keystrokes/info typed by a user in a website/app to send back to a third party
Keylogger
malicious code is installed on a computer to misdirect users into fraud websites without consent. “Phishing without a lure.”
Pharming
crime of obtaining personal/financial info of another person to make transactions/purchases
Identity Theft
criminal misrepresents themself as another person to avoid a summons/warrant/arrest/convictions
Criminal Identity Theft
identifying as another person to obtain free medical care
Medical Identity Theft
using another person’s identity/info to get credit, goods, services, benefits. Most common
Financial Identity Theft
using a child’s identity for personal gain (to obtain residence, employment, etc.)
Child identity theft
identifies as a well-known company to “fix issues” by a pretend website asking for credentials
Account Verification Phishing
link appears to look like a shared file, directs you to a log-in page in pretend website
Cloud File Sharing Phishing
Link will prompt you to sign into view the document, giving attackers control of your inbox
Docusign Phishing
has a document presented as an unpaid invoice and claims service will be terminated if invoice is not paid
Fake invoice Phishing
appears to come from a popular retail/delivery app, includes notifications with malicious link
Delivery Notifications Phishing
Fake government agency claims tax problems and provides means to the issue before legal actions/fines
Tax Scam Phishing
gaining of unauthorized access to data in a system or computer
Hacking
criminal makes fake user interface: leads the user to another website instead of the intended website
Cookie Theft
replication of website so the user enters information without knowing the problem, which the hacker misuses and seizes
Virus
uses cache of another website to direct to a malicious website
DNS Spoofing
released into the files of the website once a hacker enters. It corrupts the information on the website
UI Redness
Enumerate the Types of Hackers.
Ethical Hacker (White Hat), Cracker (Black Hat), Grey hat, Script Kiddies, Hacktivist
hacks systems to identify weaknesses. Testing & Vulnerability assessments
Ethical Hacker (White hat)
hacks for personal gain, to steal corporate data, violate privacy rights, transfer bank funds, etc.
Cracker (Black hat)
in between white hate and black hat. Breaks into systems without authority to identify and reveal weaknesses to the owner
Grey Hat
gains access to computer systems with premade tools
Script Kiddies
Uses hacking to send messages by hijacking and leaving a message
Hacktivist
If you create something—an idea, an invention, a form of literary work, or research, you have the right of how it should be used by others. This is called..?
Intellectual Property