Unit 1 ICT Grade 12 - 2016
Unit 1 ICT Grade 12 - 2016
1.1. Ethical, Legal, Social, Environmental and Health Issues in the Use of Information Systems
The use of new technologies including information systems has a significant impact on
human behavior and our daily activities including how we live, work, and learn.
The knowledge and skills about raising issues and proper use of information systems help
students to become responsible members of society who can navigate a knowledge based
and technology-led economy.
This sub unit will focus on the major issues in use of information systems.
1.1.1 Ethical and Legal Issues in Information System
Ethics is all about the principles of making right or wrong decisions
Ethics defined as, the discipline concerned with what is morally good and bad and morally
right and wrong.
Ethical principles needs to be respected and if not might result in legal consequences for
those cases that are against the applied laws.
The role of ethics in information systems has become more crucial as a result of technology.
The ethical and legal issues include privacy, security, information gathering and digital
ownership related concerns.
I. Privacy: digitized environment, information privacy relates to personal data stored on the
computer system, has become a prime concern for everybody.
Most people have their data spread throughout the digital systems, and private
information should be accessed using personal passwords.
Personal accounts such as email, social media, and private bank accounts, can be
accessed by unauthorized sources which create both ethical and legal concerns.
II. Digital Ownership: It is ability to access and/or use and protects data, information, and
knowledge about ourselves or things we own.
The expansion of digital mediums has allowed information to flow more freely
than before which makes content easily copied and pasted online.
This permission can promote sharing of knowledge and information, credits the
source and protect the consumer from false information.
III. Information Gathering: Many information system applications collect users’ data and
credentials as part of their operations. Such
Information gathering trends can lead to many ethical and legal issues depending on
the purpose and level of information gathering approaches.
IV. Information Security and Liability: Growing amounts of personal and financial information
are being transferred and stored online as organizations and businesses depend more and more
on electronic data and computer networks to carry out their daily operations.
Users also need to report any security breach incidents that happened on their systems and
tools to the concerned department/unit or expert in their organizations or the concerned
government body promptly.
Grade 12 ICT Short not/2016E.C/ 1
1.1.2 Social Issues in Information System
social advantages including access to technology which fills the digital divide gaps within the
global citizens,
use of advanced technologies like Artificial Intelligence and Augmented Reality in public
Which changes how peoples act and react, and widespread use of digital platforms, social
Medias and computer games for business and entertainment activities?
A. Socializations Gaps: - Socializing within a family unit has always been important, as it
strengthens the bonds among family members or friends and ensures cohesion within the group.
B. Cyber Bullying: - It is a practice of sending, posting, or disseminating unfavorable, hurtful, or
malicious content about someone else online.
It can also involve disclosing sensitive or private information about another individual
in a way that causes embarrassment or humiliation.
Cyber bullying can happen online through social media, forums, or gaming where
users can interact with, or exchange content with others.
C. Social Media and Gaming Addiction:- According to addiction center definition social media
and gaming addiction is a behavioral addiction that is characterized as being overly concerned
about social media and computer games, driven by an uncontrollable urge to log on to or use
social media, and devoting
D. Plagiarism: – are known for their educational benefits, which are praised, but having access to
all knowledge have drawbacks of its own.
Plagiarism is presenting work or ideas from another source as your own, with or
without consent of the original author, by incorporating it into your work without full
acknowledgement
The act of plagiarism has grown to be a significant issue because students can easily
copy and paste entire passages of material from Internet resources without giving
credit to the author
E. Cybercrime: - Computers have contributed positively to the development of both individual
actions and large-scale global movements.
The other side of the coin is organized cybercrime which is use of a computer as an
instrument to further illegal ends, such as committing fraud, stealing identities, or
violating privacy and intellectual property rights
Interested and skilled students can also start the journey of being skilled cyber
warrior who is a well-trained, skilled professional in the information technology or
Information security industry that manages computer networks and system
operations.
F. Job Opportunities and Challenges: - The current trends in automation and emerging
technologies like artificial intelligent machines help to automate routine tasks which lead to
improved quality of service.
Expansion of automated systems leads to loss of jobs because some types of jobs like cashiers,
data entry clerks, and factory workers can be managed by automated systems
trade secrets ,
patents,
Grade 12 ICT Short not/2016E.C/ 3
copyrights, and
trademarks.
Trade secrets: “Trade secrets are Intellectual Property rights on confidential information which
may be sold or licensed. The unauthorized acquisition, use or disclosure of such secret information
in a manner contrary to honest commercial practices by others is regarded as an unfair practice and
a violation of the trade secret protection”.
Example:- include customer lists, source code, recipes for certain food items and beverages
including (Pepsi, CocaCola, and Sprite), software processes.
Patent: “A patent is an exclusive right granted for an invention. a patent provides the patent
owner with the right to decide how - or whether - the invention can be used by others. In exchange
for this right, the patent owner makes technical information about the invention publicly available
in the published patent document’’
Example of patented products include software programs like Airbnb, Amazon, One-click, the
page rank algorithm of Google, and other inventions including the light bulb, telephones,
Bluetooth, and more. All software products can have a patent.
Copyrights: Copyrights and patents are not the same although people are often confused.
A copyright is a type of intellectual property protection that protects original works of
authorship, which might include literary works, music, art, and more.
Copyrights also protect computer software and architecture. Copyright protections are
automatic; once you create something, it is yours.
However, if your rights under copyright protections are infringed, and you wish to file a
lawsuit, then registration of your copyright will be necessary.
Graphical User Interfaces (GUIs) can also be registered for copyright.
What is digital collaboration and how it can change the way we learn?
Digital collaboration means working with other individuals or teams and getting things done
using digital devices and technology.
It can include different tools, apps, software, procedures and processes.
Digital collaboration uses technology to improve workplace collaboration, communication,
document management, content management, and information flow across the organization
which in turn leads to improved employee productivity and efficiency.
Digital collaboration has become important and is relevant to most organizations, groups,
communities, schools and creative groups and current digital world.
Internet and Internet-based applications is an important part of digital collaboration as
they helps employees collaborate in real-time, even beyond time zones and geographical
boundaries.
2. Collaborative tools: There are many tools and systems available that foster collaboration, but
not every solution will be a good fit due to its features, prices, usage polices and eases of use.
Grade 12 ICT Short not/2016E.C/ 5
The choice of technology, along with how well employees use it will determine effectiveness of
the collaboration.
Digital Collaboration tools types including the following with their examples:
a. Communication tools: Communication tools include options for integrated messaging, co-
working services, Privacy and access settings, Conference calling, Video chats with screen
sharing etc. o Examples- Microsoft Teams, Skype, Google Meet, Zoom, Cisco Webex, Slack,
Microsoft Yammer, and more •
b. Documentation and file sharing tools: This tools includes features like Support for different
file types, Comments, and notes attached to files, track changes and versioning, editing
permissions and access control, folder sharing , and more. o Examples- Google Drive, Google
Docs, Dropbox, MS SharePoint, Media Fire, and more.
c. Project Management tools: It has underlying project and task management capabilities at their
core. o Examples- Trello, Asena, ClickUp, and more. •
d. Data Visualization tools: These tools should support a range of visual styles, be easy and quick
to use, and be able to handle a significant amount of data. o Examples- Google Charts, Tableau,
Power BI, Grafana, Chartist, FusionCharts, Datawrapper, Infogram and more. •
e. Note taking tools: These tools help to quickly capture and organize your notes, ideas, web page
content and more. o Examples- Evernote, Microsoft OneNote and Google Keep and more.
3. Device: Devices are also key players. Devices such as smartphones, tablets, and laptops are often
an afterthought, but they are important components of digital collaboration.
1.5. Engaging in Citizenship through Digital Technologies
How can you apply digital technologies to develop citizenship engagement?
Digital citizenship refers to the responsible use of technology by anyone who uses computers,
the Internet, and digital devices to engage with society on any level.
The ability to engage positively, critically, and competently in the digital environment to practice
forms of social participation that are respectful of human rights and dignity through responsible
use of technology.
Young people citizenship needs to be supported to participate safely, effectively, critically, and
responsibly in a world, which is filled with social media and digital technologies.
Good digital citizenship teaches peoples how to use digital tools to communicate with one
another, empathize with one another, and build long-lasting connections. On the other hand,
poor digital citizenship includes things like online bullying, careless social media use, and a
general ignorance of Internet safety.
Key Terms
Copyright - A copyright is a type of intellectual property protection that protects original
works of authorship, which might include literary works, music, art, and more
Digital citizenship- refers to the responsible use of technology by anyone who uses
computers, the Internet, and digital devices to engage with society on any level.
Digital collaboration - means working together and accomplishing goals while using digital
tools and technology. It may consist of anything, such as devices, programs, software, steps, or
an entirely new technique.
Digital identity is an online or networked identity adopted or claimed in cyberspace by an
individual, organization, or electronic device.
Intellectual property right - refers to a range of intangible rights of ownership as an asset
such as a software program or designed information system
Information Systems – are interrelated components working together to collect, process,
store, and disseminate information to support decision making.
Review Questions
Part I: Write True if the statement is correct and False if it is incorrect.
1) The concern and questions of ethics and legality are essential in many industries including
education.
2) Most people have their data spread throughout the digital world which can be accessed by
unintended sources.
3) Since information technology becomes increasingly influential, ethical and legal
considerations are non-relevant and less important.
4) In the current digital world, security issues have been resolved by locking a door only.
5) To fulfill the objectives of environmental management, technological advancements require
systems that can make proper and ethical of information systems and telecommunication
infrastructures.
6) Most people have complex online lives, and they may not even realized how their personal
information is being collected and used.
Part II: Choose the correct answer from the given alternatives.
1) Which one of the following is NOT among four pressing ethical and legal issues confronting
the industry today? A. Data Creation B. Privacy C. Data gathering D. Digital ownership
2) What types of data can be collected from customers’ purchase behavior by companies even
without their consent in some cases? A. Purchasing patterns, B. Personal preferences,
C. Professional/social affiliations D. None
3) Which type of information system structure is seen in the environment in which people
collaborate to deal with environmental problems? A. Environmental Information systems
B. Health Information System C. Agricultural Information System D. Enterprise Resource
Planning System
4) Health-related negative effects of information system include all except___________.
A. Adaptability to use technology B. Loss of attention and stress C. Sleeping disorders
Emerging Technology is a term that is commonly used to describe a new technology, but it can also
refer to the evolution of existing technology.
Emerging technology concepts including data science, artificial intelligence (AI), virtual reality,
and augmented reality in your grade 11 Information technology (IT) course.
This unit addresses some additional selected emerging technologies including Big data, cloud
computing, fog computing, and internet of things (IoT).
Grade 12 ICT Short not/2016E.C/ 9
2.1. Introduction to Big data
What is Big data? What makes it different from data?
Big data refers to a collection of data sources that are so massive and complex that they become
challenging to process using typical data processing software or readily available database
management tools.
Big data starts with the exponential explosion in the amount of data we have generated since the
dawn of the digital age.
This is largely due to the rise of computers, the Internet, and technology capable of capturing
information from the real and physical world we live in, and converting it to digital data that can
benefit businesses and organizations.
Big data collection, the range of organizational sources generating data needs to be identified.
These sources include business firms producing transactional data such as point-of-sale
software, endpoint devices within IoT ecosystems and marketing firms, Social media posts from
existing and prospective customers, multiple additional sources like smartphone locational data,
surveys that directly ask customers for information are also some of the sources of Big data.
Example – Global companies like Google use Big data to understand what users want from it
based on several parameters such as search history, locations, trends, and many more.
2.1.1 Characteristics of Big data
B. Velocity: Velocity refers to the speed at which data is being created in real time.
C. Volume: Volume indicates huge ‘volumes’ of data that are being generated daily from various
sources, like social media platforms, business processes, machines, networks, human
interactions, and others.
D. Value: Value is the other major issue that we need to concentrate on. It is not just the amount of
data that we store or process. It is the amount of valuable, reliable, and trustworthy data that
needs to be stored, processed, and analyzed to find insights.
E. Veracity: Veracity means the degree of reliability that the data has to offer. Big data focuses to
find an alternatives way to filter the huge unstructured data to use in business developments.
2.1.2 Benefits of Big data
Some institutions taking the initiative to use Bigdata to maximize customer services and
properly segment customers data and among the initiatives Ethiopian Airlines, Ethio Telecom,
Artificial Intelligence Center, and some banks started leverage its benefits.
Customer acquisition and retention: Consumer data can help the marketing efforts of
companies, which can act on trends to increase customer satisfaction. For example,
personalization engines for Amazon, Netflix, and Spotify can provide improved customer
experiences and create customer loyalty.
Targeted advertisements (Ads): Personalization data from sources such as past purchases,
interaction patterns, and product page viewing histories can help generate compelling targeted
advertising campaigns for users both on the individual level and on a larger scale.
I. Healthcare –
Healthcare analysts use Bigdata to inform health prevention, intervention, and
management using a variety of data analytic technologies and approaches.
These efforts can improve the patient experience, care efficiency, and quality, and reduce
healthcare costs.
Patient medical and hospital records, medical exam findings, and information acquired by
healthcare testing machines are all examples of Bigdata sources in health care.
II. Education –
Bigdata can also be utilized to improve education by providing students with a balanced
learning plan.
Educators can tailor programs for learners based on their grades and attention spans.
Students may also be offered blended learning, which combines offline and online
learning possibilities.
Bigdata is being used by educational institutions to evaluate applications and determine
who will be a good fit for the institution and who will not.
Bigdata can improve student experience, academic programming, more effective
evidence-based decision-making, and a strategic reaction to shifting global trends.
IV. Agriculture –
Smart farming and precision agriculture practices help farmers to save costs and open
new business opportunities.
Granular information on rainfall patterns, water cycles, fertilizer needs, and other topics
is made available to farmers through big data.
Use this information to make wise choices about when to harvest and what crops to grow
for maximum profit. Making the proper choices ultimately increases agricultural outputs.
VI. Retail –
Bigdata has changed the way traditional retail industry. works. Over the years, retailers have
collected a vast amount of data from local demographic surveys, Point of Sale (PoS), scanners,
customer cards, and store inventory.
They have started to use this data to create personalized customer experiences, boost
sales, increase revenue, and deliver improved customer service.
Data quality, storage, a shortage of data science experts, validating data, and gathering data
from various sources.
Emerging technologies will change over time due to the dynamic and frequent advancement
of those technologies
Why do you think the name’ cloud’ is used for cloud computing?
It is defined as storing and accessing data and computing services over the Internet.
It does not store any data on your personal computer.
Computing services like servers, data storage, networking, databases, etc. are all available
on-demand.
Main advantage of cloud computing
It gives access to many users from single data center which allows users to store and access
their data over the internet without any limitations.
goal of cloud computing is to provide easy and flexible access to computing resources and
Information technology services, various which hardware and software components are
required for the proper use of a cloud computing model.
E. Controlled costs
Cloud Computing allows for greater control of costs IT infrastructure. We can adjust the
resources allocated to its infrastructure depending on its needs by increasing or decreasing
the resources available.
Subscribing to Cloud Computing services, users or companies pay only for what they used
(Pay as you go model). This helps users to no longer deal with costs relating to maintenance
and renew computer equipment (servers, computers, etc.) Companies and
users can reduce their IT investments and optimize their operational and business costs
2. Private cloud
3. Hybrid cloud
It is the combination of public cloud and private cloud. You can host your public service
in the public cloud, and confidential and data-related services in the private cloud. It
offers a very flexible and comprehensive benefit.
4. Community cloud
It is a collaborative, multi-tenant platform used by several distinct organizations to share
the same applications.
Community cloud is a private cloud that functions much like a public cloud. The platform
itself is managed privately, either in a data center or on-premises.
Governmental institutions, healthcare facilities, financial services companies, and other
professional communities frequently use this solutions.