Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
3 views4 pages

CAPE IT Unit 2 Module 3

Uploaded by

rianna.kiss
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views4 pages

CAPE IT Unit 2 Module 3

Uploaded by

rianna.kiss
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

UNIT 2

MODULE 3: SOCIAL, ORGANISATIONAL AND PERSONAL ISSUES

GENERAL OBJECTIVE

On completion of this Module, students should:

1. develop an understanding of the potential risks as well as strategies for mitigating these in
Information Technology;

2. develop an awareness of laws and policies associated with information systems; and,

3. develop an awareness of the ethical, legal and social considerations associated with
information technology.

SPECIFIC OBJECTIVES CONTENT


Students should be able to:

1. identify systems where Information Systems including modes of interaction between


Technology plays a significant role people.
in human activities;
Impact of automation of existing processes;
process innovation.

Knowledge management; impact on job skills,


job opportunities, retraining.
Education: e-learning.

Need for organization and national information


policies and strategies.
Economy and economic opportunities (trade
agreements), commercial transactions,
e-commerce and e-business, online shopping;
e-governance, taxation, telecommuting;
technology transfer; emergence of new
organisations (virtual organisations).

Entertainment: culture, gaming.

Health care: e-surgery.

Safety and security: privacy, surveillance, Secure


Sockets Layer, e-policing.

Politics.

Identification of biases in data: cultural biases


gender and diversity related issues.

2. discuss various computer and Including propaganda; computer fraud,


cybercrimes; industrial sabotage; malware (including viruses,
Trojan horses and worms; ransomware),

CXC A4/U2/21 24 www.cxc.org


UNIT 2
MODULE 3: SOCIAL, ORGANISATIONAL AND PERSONAL ISSUES

SPECIFIC OBJECTIVES CONTENT

Students should be able to:

electronic eavesdropping; cyber terrorism, cyber


bullying, hacking; identity theft, spoofing, phishing,
hardware theft and vandalism, piracy, information
theft, spam, denial of service, pharming.

3. discuss how Information System Hardware, software, network, users, procedures and
components can be exposed to data. System misuse and abuse; system failure:
threats, vulnerabilities, attacks and defective hardware, software glitches or bugs;
compromises in organisations; threats posed by Bring Your Own Device (BYOD)
policies, disruptions from natural disasters and other
hazards; the pros and cons of encryption; difficulties
experienced by organisations in the disposal of
obsolete equipment.

4. evaluate legal and ethical Including laws, procedures, guidelines; the misuse of
considerations and policies related information, such as manipulation of information to
to the handling and management give false representations, identity theft; invasion of
of information assets; privacy; phishing, pharming.

Policies (including Internet policies, email policies


and practices; security policies) for example,
providing Internet access to employees may expose
the organisation to lawsuits, viruses and hacking;

5. examine various other computer Computer security risks including Internet and
security, health and safety, and network attacks, unauthorised access and use;
environmental risks; hardware theft and vandalism; software and
information theft,

Health and safety risks including repetitive strain


injury, carpal tunnel syndrome, computer vision
syndrome, computer addiction.

Environmental risks including energy consumption,


environmental pollution, e-waste.

6. discuss key mitigation strategies Including disaster recovery plan, backup;


(mechanisms and measures) to uninterruptible power supply (UPS); surge
counter risks; protectors, firewalls; authentication: usernames,
passwords, key cards, biometric devices, encryption;
intrusion detection software; antivirus software;
audit trails; transaction logs.

CXC A4/U2/21 25 www.cxc.org


UNIT 2
MODULE 3: SOCIAL, ORGANISATIONAL AND PERSONAL ISSUES

SPECIFIC OBJECTIVES CONTENT

Students should be able to:

Ergonomics and workplace design; therapy and


support groups (to address IT issues such as
cyber bullying of computer addiction); green
computing.

7. distinguish among intellectual Differences among terms: intellectual property


property terms; rights; proprietary data and software, copyright,
patent and trademark.

8. describe licensing arrangements; Open Source, Proprietary Software, Freeware,


Shareware, software licensing including
agreements, shareware, freeware, site licenses,
enterprise licenses and single user licenses;
product activation; digital rights management.

9. examine the issue of plagiarism and Definition of plagiarism, forms of plagiarism (e.g.
its implications; word-for-word, paraphrasing, failure to cite,
incorrect citation, claiming sole ownership),
digital media as intellectual property.

Negative implications of plagiarism:


repercussions for individuals and business
entities (for example, lawsuits, blacklisting,
costly settlements).

10. examine the consequences of Including enacting legislations, establishing


software piracy; policies, loss of revenue for developers.

11. examine the social implications of Social media; cyberbullying; cybercrime; online
interacting in an online games; adult content.
environment;
Implications for example addictions, financial
loss, psychological and physical.

12. examine the expanding role of Non-human interactions for business operations
machine interactions with (for example, robots, chatbots, video tellers in
individuals/customers; and, customer service, banking, reservations, billing,
queries).

13. evaluate the expanding role of Definition and role of wearable computing.
wearable computing devices.
Wearable computing devices, examples and
applications: stand-alone, frontend/backend
systems, location based, internet based).

CXC A4/U2/21 26 www.cxc.org


UNIT 2
MODULE 3: SOCIAL, ORGANIS

Suggested Teaching and Learning Activity

students in the teaching and learning activities listed below.

1. Engage students to work in groups to search and find resource materials relevant to different
topics in this Module. These should be peer reviewed using agreed criteria. Those that meet
the requirements should be placed on the class webpage.

2. Invite resource persons with the relevant expertise to share their experience with issues such
as threats, risks, vulnerabilities, countermeasures, handling and managing information
technology assets, health and safety and plagiarism.

3. Use case studies to demonstrate concepts such as threats, countermeasures, computer crimes,
internet entertainment, copyright, patent and trademark laws.

4. Use concept maps and concept frames to organise and illustrate the interrelationships
between various pieces of information.

5. Conduct teacher-guided classroom discussion. Students should be encouraged to discuss and


debate the ethical, social, economic, legal and political implications of the use of Information
Technology.

6. Have students obtain brochures from vendors and service providers and review them based on
the relevant criteria. Students will share their feedback with the class.

7. Allow students to work in groups to engage in research or a WebQuest activity on job


opportunities or careers in the field of information technology. They should creatively share
the information with the class.

RESOURCES

Daley, B. Computers are your Future, New Jersey: Pearson


Prentice Hall, 2008.

Information Technology and Computer Science for CAPE and


College Students, LMH Publishing Limited, Jamaica, 2017.

Parson, J. and Oja, D. Computer Concepts, New York: International Thompson


Publishing Company, 2007.

Shelly, G., Cashman, T., and Discovering Computers, New York: International Thompson
Vermaat, M. Publishing Company, 2014.

Electronic Resources

https://learninghub.cxc.org/

https://www.interaction-design.org/literature/book/the-encyclopedia-of-human-computer-
interaction-2nd-ed/wearable-computing

CXC A4/U2/21 27 www.cxc.org

You might also like