0% found this document useful (0 votes)
14 views

unit 1 G12

Information system unit 1 grade 12

Uploaded by

abrshworkulove
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

unit 1 G12

Information system unit 1 grade 12

Uploaded by

abrshworkulove
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

10/8/2023

1.1. Ethical, Legal, Social, Environmental and


Health Issues in the Use of Information Systems
 The use of new technologies including information
Grade 12 systems, has a significant impact on human behavior
and our daily activities including how we live, work,
IT and learn.
UNIT 1  Increased consequences have been emerging which
needs all user’s awareness about the use of
INFORMATION SYSTEMS information systems.
 The knowledge and skills about raising issues and
AND THEIR proper use of information systems help students to
become responsible members of society who can
APPLICATIONS navigate a knowledge based and technology-led
economy.

1.1.1 Ethical and Legal Issues in Information System some ethical and legal issues
• Ethics is all about the principles of making right or 1. Privacy:
wrong decisions. • information privacy relates to personal data stored on
• According to Britannica dictionary, ethics defined as, the computer system
the discipline concerned with what is morally good and • Most people have their data spread throughout the
bad and morally right and wrong. digital systems, and private information should be
• Ethical principles needs to be respected and if not accessed using personal passwords.
might result in legal consequences for those cases who • However, personal accounts such as email, social
are against the applied laws. media, and private bank accounts, can be accessed by
• Many professionals including medical and education unauthorized sources which create both ethical and
professionals, government officials, and business legal concerns.
people have legal and ethical oversight to control how • It is morally wrong and unethical to view an
their professions function. individual’s private information in anyways which may
also end up being a legal issue.

2. Digital Ownership: 3. Information Gathering:


 It is ability to access and/or use and protect data,  Many information system applications collect users’ data and
information, and knowledge about ourselves or things credentials as part of their operations.
we own.  Such information gathering trends can lead to many ethical and legal
issues depending on the purpose and level of information gathering
 The expansion of digital mediums has allowed approaches.
information to flow more freely than before which  The measure has opened a debate about what and why information
makes content easily copied and pasted online. can be gathered.
 This makes digital ownership hard to control in the  This issue raises a question of consent which protect individuals
against attempts to steal information.
digital world.  Users need to understand and examine the intention of any
 It is unethical to use somebody else’s digital works information-gathering request by any service providers or third-party
without getting permission from the owner first since it applications while they use the services. Such requests need special
ignores the right of the creator. Creators has right to attention if those organizations, systems, or applications request
personal information and credentials.
allow or deny the use of the contents.
 This protects against any illegal and fraudulent information stealing
attempts.

1
10/8/2023

4. Information Security and Liability: 1.1.2 Social Issues in Information System


 Growing amounts of personal and financial information are being  The expansion of accessible information system technologies has
transferred and stored online as organizations and businesses depend led to several significant changes in how society functions.
more and more on electronic data and computer networks to carry out  With personal computers and the Internet offering unrestricted
their daily operations. access to all of the knowledge ever created and discovered by
humans, the majority of these changes have improvements to
 If and when a breach in information security happens, this might expose society.
organizations and businesses to potential security liability. Such attempts  Those social advantages including access to technology which fills
might lead to identity theft, which happens when the personal details of the digital divide gaps within the global citizens, use of advanced
innocent people to be harvested by a third party so that they can be used technologies like Artificial Intelligence and Augmented Reality in
for malicious purposes. public which changes how peoples act and react , and widespread
 Accepted procedures and rules are needed to provide conditions to use of digital platforms , social medias and computer games for
increase the reliability of information systems. Users also need to report business and entertainment activities
any security breach incidents that happened on their systems and tools to  However, some negative social issues to consider while using
the concerned department/unit or expert in their organizations or the technological services and Internet-based applications
concerned government body promptly

some negative social issues 2. Cyber Bullying-


1. Socializations Gaps
 Socializing within a family unit has always been important, as it  It is a practice of sending, posting, or disseminating
strengthens the bonds among family members or friends and
ensures cohesion within the group. unfavorable, hurtful, or malicious content about someone else
 However, with more and more households owning several online.
computers and numerous portable devices granting access to  It can also involve disclosing sensitive or private information
information and entertainment.
 some argue that this is leading to a lack of family socialization and about another individual in a way that causes embarrassment
natural interactions in the present moment or humiliation.
 It is also become common to see friends who are out in a cafe and  Cyber bullying can happen online through social media,
still staring at a touch screen rather than talking to one another.
Increase your digital well-being by allowing technology to improve forums, or gaming where users can interact with, or exchange
your life and not become a distraction from your life and others. content with others. It can also happen through text and other
messaging applications
 Example - The availability of the internet and computer
access can cause problems in terms of online gender-based
violence’s, harassments and sexual abuse which is one of
serious issues to address to protect our community to live a

4. Plagiarism 5. Cybercrime
 Computers have contributed positively to the development of both
• According to university of oxford, Plagiarism is presenting work or individual actions and large-scale global movements.
ideas from another source as your own, with or without consent of  The other side of the coin is organized cybercrime which is use of a
the original author, by incorporating it into your work without full computer as an instrument to further illegal ends, such as committing fraud,
acknowledgement. stealing identities, or violating privacy and intellectual property rights as
• The act of plagiarism has grown to be a significant issue because stated in Britannica dictionary.
students can easily copy and paste entire passages of material from  Cybercrime, especially through the Internet, has grown in importance as the
Internet resources without giving credit to the author computer has become central to education, commerce, entertainment, and
• This has particularly become a challenge for educational institutions, government.
now applying different tools and systems to check the originality of  According to Official reports from Ethiopian Information Network Security
students’ work at all levels. Agency (INSA) officials Ethiopia is also experiencing different cyber-attacks
which shows increasing trend from time to time that needs a serious
• Plagiarism in the workplace and in academia can destroy an author’s attention and a collaborative effort from all citizens and professionals.
credibility and have significant consequences, such as dismissal from  This clearly shows that students need to prepare themselves for the 21st-
school or job loss. century patriotism mission to protect personal, organizational and national
• Students need to produce original works, use books and Internet digital resources by being mindful system users to protect against crime and
resources as references and sources of insight, and give appropriate terrorism attempts to ensure the country’s digital sovereignty
credit to authors when they refer to their works in any way

2
10/8/2023

3. Social Media and Gaming Addiction 6. Job Opportunities and Challenges


- According to addiction center definition social media and gaming  The current trends in automation and emerging technologies like
artificial intelligent machines, help to automate routine tasks which
addiction is a behavioral addiction that is characterized as being overly lead to improved quality of service.
concerned about social media and computer games, driven by an
 On the other hand, such expansion of automated systems leads to
uncontrollable urge to log on to or use social media, and devoting so much loss of jobs because some types of jobs like cashiers, data entry
time and effort to social media that it impairs other important life areas. clerks, and factory workers can be managed by automated systems.
- This day’s social media and video gaming are common ways in which  Automation often creates as many jobs as it destroys over time.
people spend their leisure time.  The type of skills that people need to acquire is constantly changing
- Researches on social networking addiction and Internet gaming disorders and people with low educational backgrounds are most at risk since
finds that intensive online activity can negatively impact young people’s the future job market needs more skilled professionals.
mental health.  We must be mindful of our actions and be responsible for every step
- Students need to be curious and mindful about their use of social media that we take to get benefits out of those advancements.
and video games to live a safe and healthy lifeSuch practices have direct
links and impacts on their family relationships, learning performance,
future life goals, and mental health.

1.1.3 Environmental issues caused by Information Systems 1.1.4 Health Issues caused by information systems
 Using technologies smartly and responsibly is essential in order not
to create problems while utilizing the advantages. Because  Health information systems are essential for the rapid
electronic devices contain hazardous materials that are unsafe for generation of high-quality data that will be used to
the environment. inform all relevant stakeholders for program planning,
 Most electronic devices contain non-biodegradable materials, heavy review, and monitoring as well as generally ensuring and
metals, and toxic materials like cadmium, lead, and mercury which enhancing the quality of all components of the health
can leak into the ground, where they can contaminate the water we
drink, the plants we eat, and the animals that live around the area. system.
 This clearly shows that is our responsibility to protect the  The widespread use of information systems and access
environment while we use and dispose of any information system to mobile device in healthcare can make it easier to
components. offer care, improve care delivery, empower patients
 To this end, advanced electronic waste management techniques through personalized messaging, and collect real-time
shall be applied to minimize the damage.
data to optimize resources and decision-making.
 Negative impact of information systems on the environment have
also led to the development of new environmentally friendly  However, we must also pay attention to health related
technology solutions aiming to help solve some of the biggest challenges that caused by unmanaged use of
environmental concerns that we face as a society through a shift information system services and products on users.
towards a more sustainable, low-carbon economy.
 Some of the challenges include, sleeping disorders and
lack of productivity, loss of attention and stress.

Four Types Of Intellectual Property Rights


1.2. Intellectual Property
1. Trade secrets: are Intellectual Property rights on
Intellectual property rights refers to a range of confidential information which may be sold or
intangible rights of ownership of an asset such as licensed. The unauthorized acquisition, use or
a software program or designed information disclosure of such secret information in a manner
system. contrary to honest commercial practices by others is
regarded as an unfair practice and a violation of the
Intellectual property rights provides different trade secret protection
methods for protecting these rights of ownership 2. Patent: is an exclusive right granted for an invention.
based on their type. Generally speaking, a patent provides the patent
As stated by Ethiopian Intellectual Property owner with the right to decide how - or whether - the
Office Establishment Proclamation, Proclamation invention can be used by others. In exchange for this
No. 320/2003 “Intellectual property” means a right, the patent owner makes technical information
legal right over a creative work of the human about the invention publicly available in the published
patent document’’. When a property owner holds a
intellect and includes patent, trademark, patent, others are prevented, under law, from offering
registration certificate and copyright” for sale and making or using the product.

3
10/8/2023

Four Types Of Intellectual Property Rights


3. Copyrights: Copyrights and patents are not the same
1.3. Digital Identity Management
although people are often confused. A copyright is a
• As stated by onfido.com, “a digital identity is a collection
type of intellectual property protection that protects of information about a person that exists online”.
original works of authorship, which might include • This data can be used to create a digital image of a person
literary works, music, art, and more. Copyright when it is collected. Such information can be used by
protections are automatic; once you create something, businesses to identify their clients.
it is yours. However, if your rights under copyright • A digital identity is all of information about an individual,
protections are infringed, and you wish to file a lawsuit, organization, or electronic device that exists online.
then registration of your copyright will be necessary. • Every individual should have the right to a trusted and
Graphical User Interfaces (GUIs) can also be registered secured digital identity to access fundamental services,
like financial services, mobile connectivity, health,
for copyright. controlling device using fingerprint education, and other
4. Trademarks: is a sign capable of distinguishing the services.
goods or services of one enterprise from those of other
enterprises”.

Cont…………………… 1.4. Collaboration Through Digital Technologies


 For almost every organization, digital identity management  Digital collaboration means working with other individuals or teams
presents both significant opportunities and associated risks. and getting things done using digital devices and technology.
 Management of a digital identity involves limiting the data  It can include different tools, apps, software, procedures and
processes.
that a person gives out, avoiding excessive use of storage,
checking what data is stored about each individual, making  Digital collaboration uses technology to improve workplace
collaboration, communication, document management, content
corrections to incorrect personal data, avoiding redundant management, and information flow across the organization which
data, etc. in turn leads to improved employee productivity and efficiency.
 Digital identification can be verified in a variety of ways,  Digital collaboration has become important and is relevant to most
including through database checks, document and identity organizations, groups, communities, schools and creative groups
verification, biometric verification, and identity verification. and in the current digital world.
 A user can access internet services including banking,  To this end, Internet and Internet-based applications is an
health, and travel after proving their identity. important part of digital collaboration as they helps employees
collaborate in real-time, even beyond time zones and geographical
 There is an ongoing effort at a national level to enhance boundaries
citizens’ digital identity management practices.

Components of Digital Collaboration  Project Management tools: It has underlying project


and task management capabilities at their core.
 Data Visualization tools: These tools should support a
a) People: People are at the heart of collaboration range of visual styles, be easy and quick to use, and be
b) Collaborative tools: Digital Collaboration tools able to handle a significant amount of data.
includes many types including the following
 Communication tools: Communication tools include  Note taking tools: These tools help to quickly capture
options for integrated messaging, co-working and organize your notes, ideas, web page content and
services, Privacy and access settings, Conference more.
calling, Video chats with screen sharing etc. c) Device: Devices are also key players. Devices such as
 Documentation and file sharing tools: This tools smart phones, tablets, and laptops are often an
includes features like Support for different file types, afterthought, but they are important components of
Comments, and notes attached to files, track changes digital collaboration. . They are the physical media we
and versioning, editing permissions and access use to connect
control, folder sharing , and more.

4
10/8/2023

1.5. Engaging in Citizenship through Digital Technologies Key Terms


 Digital citizenship refers to the responsible use of technology
by anyone who uses computers, the Internet, and digital  Copyright - A copyright is a type of intellectual property
devices to engage with society on any level. protection that protects original works of authorship, which
 It require the ability to engage positively, critically, and might include literary works, music, art, and more
competently in the digital environment to practice forms of  Digital citizenship- refers to the responsible use of
social participation that are respectful of human rights and technology by anyone who uses computers, the Internet,
dignity through responsible use of technology. and digital devices to engage with society on any level.
 Good digital citizenship teaches peoples how to use digital  Digital collaboration - means working together and
tools to communicate with one another. accomplishing goals while using digital tools and
 Poor digital citizenship includes things like online bullying, technology. It may consist of anything, such as devices,
careless social media use, and a general ignorance of Internet programs, software, steps, or an entirely new technique.
safety  Digital identity is an online or networked identity adopted
 It is about being active citizens who see possibilities instead of or claimed in cyberspace by an individual, organization, or
problems, and opportunities instead of risks as they curate a electronic device.
positive and effective digital footprint.

Key Terms Key Terms


 Intellectual property right - refers to a range of intangible rights of  Trade secret- refers to specific, private information that
ownership as an asset such as a software program or designed
information system is important to a business because it gives the business
 Information Systems – are interrelated components working a competitive advantage in its marketplace
together to collect, process, store, and disseminate information to  Trademarks refer to phrases, words, or symbols that
support decision making.
 Information Technology (IT) - is the use of any computers, storage, distinguish the source of a product or service of one
networking, and other physical devices, infrastructure, and party from another.
processes to create, process, store, secure, and exchange all forms
of electronic data  Social media addiction is a behavioral addiction
 Patent - a patent is a type of limited-duration protection that can be characterized by excessive concern for social media, an
used to protect inventions (or discoveries) that are new, non- insatiable want to access or use social media, and a
obvious, and useful, such as a new process, machine, article of
manufacture, or composition of matter. commitment of so much time and energy to social
media that it interferes with other crucial facets of life

Discussion Questions.
1. What will be the possible legal consequences of
violating ethical issues in our information systems
use?
2. Discuss the emerging health issues associated with
the current digital devices use and systems
applications in our day-to-day life
3. What are the 3 common components of a digital
collaborations? Discuses each component meaning
and roles for effective digital collaboration
engagements.
4. What is the role of technology in enhancing digital
citizenship?

You might also like