Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Gaming ICT Ethical Dilemmas Social Networking Primary & Secondary Sources Cloud Computing AI and robotics Ecommerce ICTICT in a Global inSociety a Global Society ICT is good, but... There are a lot of issues that arise with the most popular uses for ICT today. ICT is used mostly for: Gaming Social networking Cloud computing Robotics Ecommerce Think about Social issues Ethical Issues Legal Issues Environmental Issues ...that arise from these 5 areas Index Computer Gaming Gaming Addiction • Issues with computer gaming arise when generally when people or groups are affected by it. What’s your take on it? Discuss the social, ethical, legal and environmental issues. Gaming Addiction • Crave computer time Gaming Addiction • Overjoyed when at the computer Gaming Addiction • Unable to stop a computer activity Gaming Addiction • Irritable when not at the computer • Everything else is annoying and boring... Gaming Addiction • Neglect family and friends Gaming Addiction • Problems at work or school Unsuitable Games • What’s an unsuitable game? • Games that are of concern. • Generally have either one or a combination of excessive: Violence Racism Sexism Unacceptable acts that would be wrong in real life. Unsuitable to Impressionable People • Impressionable people are generally young people. • There is also a minority of adults and teens. • Shooters • MMORPGs – Massively multiplayer online role-playing game “What? You mean you have RL friends?.... Nice.” Discussion - Responsibility Designers should build appropriate games Marketers should monitor the distribution of games to appropriate audiences Parents should monitor what’s played Children should be educated about gaming Authorities need to take action over moral and ethical issues associated with gaming Gamers need to know themselves Index Social Networking Benefits of social networking • Fill in student responses here.... Social Networking Technology Wikis – a site that allows easy creation and editing of interlinking pages. Blogs – part of a website, written by the person who runs the blog. Generally a commentary or diary. Mashup – a web app or page that is a combination of separate parts. Info is supplied by an external site. Folksonomies – allow users to interact with others by tagging and categorising content, especially photos Web 2.0 Tech “Behind every web 2.0 techs there is always...” A data base that stores the info A web application access and displays the data in the specific format. Main technologies used in Web 2.0 are: JavaScript, AJAX & Flash Web 2.0 Tech continued What is it and what are they doing? A combo of technologies that can retrieve data from a server in the background without interfering with the display on the screen at the time. PHP • Is a scripting language used for making dynamic web pages • Can also access databases dynamically and send it to the “client side” to be displayed. Social Networking Issues • What’s your say? Social Networking Issues • Addiction Social Networking Issues • Predators Social Networking Issues • Privacy Social Networking Issues • Cyber Bullying Social Networking Issues •Copyright Issues Social Networking Issues • Security of information How to avoid problems with social networking 1. 2. 3. 4. 5. 6. 7. Be sceptical about people Be careful of the info you give out Report suspicious behaviour Inform people who are vulnerable Watch your privacy settings Be aware of copyright infringements Use an Alias that only some know about Index Cloud Computing Lightning Quiz Signs of Gaming Addiction Irritable when not at the computer Unable to stop a computer activity Problems at work or school Neglect family and friends Overjoyed when at the computer Crave computer time Behind every Web 2.0 tech there is a? Database 4 types of social media •Wikis •Blogs •Mashup •Folksonomies Issues with social media Addiction Predators Privacy Cyberbullying Copyright Issues Security of information What’s the cloud? The Internet A cloud is used to represent the internet in network diagrams. Cloud Computing Services 3 basic types Virtual IT Using a cloud company’s servers as virtual storage Software Development Use of software development tools, facilities and services to create custom apps that will then run on the cloud company’s servers Software use Sell licenses for their software to be used remotely Examples of Cloud computing • • • • • • Google Docs – create, edit docs online Skype – phone calls QuickBooks online – store & edit financial info Online Web based games - Runescape Online Backup – online storage Salesforce – Online financial storage Benefits of Cloud • Make a 1-2 word summary of each dot point listed in the textbook to help you remember. p. 112 Issues with Cloud • Make a 1-2 word summary of each dot point listed in the textbook to help you remember. p.112-113 Reducing the Risks • Make a 1-2 word summary of each dot point listed in the textbook to help you remember. p.112-113 Do Cloud Qs on p.139 Index Robotics & Artificial Intelligence Artificial Intelligence Is the branch of IT that designs robots and computer programs to perform “intelligent” actions similar to those performed by human intelligence. Applications for AI Expert systems - to give medical advice Neural networks - to discover patterns in business and scientific data Computer games – chess, bots, simulations Speech recognition – to control computers or phone answering systems Handwriting & character recognition – in scanners and PDAs Applications for AI “Fuzzy Logic” – to run machines more efficiently Controlling Robotics in industry Robotic toys Comp Vision and Image processing – used in surveillance and industry Text Analysis– sort documents and large amounts of text Expert System • A computer application that performs a task that would otherwise be performed by a human expert. • Deductive reasoning based on a large database of information. Neural Network • A type of artificial intelligence that attempts to imitate the way a human brain works. • A neural network works by creating connections between processing elements, the computer equivalent of neurons. • They are most effective for predicting events when the networks have a large database of prior examples to draw on. Fuzzy Logic • Logic that recognises more than simple true and false values. • Propositions can be represented with degrees of truthfulness and falsehood. • E.g. The statement, today is sunny, might be 100% true if there are no clouds, 80% true if there are a few clouds, 50% true if it's hazy and 0% true if it rains all day. • Fuzzy logic is used in expert system and some spell checkers 2 lines of research 1st Line: Trying to produce results that are similar those produced by humans. Brute force calculations. 2nd Line: Trying to produce ‘Strong’ AI which is similar to the way humans think. Eventually resulting is self awareness? Issues with Robots & AI • The main issue with AI is Trust in their results Funny enough, the same problem we have with human intelligence... Could Robots Ever Harm Humans? Discuss these issues: Robots & AI are not as smart as humans Communication between humans & robots Robots cannot make decisions about complex matters that include values Robots & AI replace humans • Read section in textbook for homework Questions on p.139 Index Ecommerce Lightning Quiz What is AI? Name some AI applications: ∆ Expert systems ∆ Neural networks ∆ Voice recognition ∆ Fuzzy logic ∆ Robotic toys ∆ Computer game AI ∆ Text analysis Issues with Robots & AI • Robots & AI are not as smart as humans • Communication between humans & robots • Robots cannot make decisions about complex matters that include values • Robots & AI replace humans Electronic Commerce We will look at 3 types of commerce B2B B2C C2C Ecommerce Business to Business E.g. A manufacturer selling online to a wholesaler. Ecommerce Business to Customer E.g. Businesses that sells online to customers Ecommerce Customer to Customer E.g. Customers using the internet to sell to each other. Success • Small, easily transported products • Services that are mainly information exchanges, like banking, auctions, online bill payments. Advantages • • • • Open 24/7 It’s a fast way of getting info Fast way of contacting suppliers/customers Easy to show large amounts of data on the Internet • Can reach a large international audience • Relatively low cost. Buying & Payment issues • • • • • • • Privacy – you give them your info... Reliability of supplier Authenticity of goods Safe Delivery of goods Value/quality of goods Extra costs – transportation Handling complaints. Refunds, returns, ect Spam • Junk mail related to advertising • The consequence of the growth of online shopping • 60% of email is bulk, advertising junk! 2 Main problem with spam is... Phishing • The content of spam is usually fruad! • Fake appeals for money, get rich quick schemes, cheap loans, leisure products, ect. Botnet attacks • Computers and servers are ‘taken over’ to perform malicious tasks • Commonly used to crash email servers by bombarding them with emails. Shopping Cart TEch • Allows direct purchase from a website How? A shopping cart includes: A back end database A site to display the product Admin software used to manage the site Disposal of ICT Products Watch... E-Waste Video Ecommerce Questions p.139 Index Investigating & Analysing ICT Issues & Ethical Dilemmas Privacy of Information Information privacy - the right of individuals and companies to deny or restrict the collection and use of information about them. Some main points from laws about info privacy: 1. 2. 3. 4. Info collected should be limited to what is necessary Restricted access only to those that must see it Info release requires permission from the individual The individual needs to know info is being collected Ownership of Information • Copyright exists even without the © 2 most common infringements include: Software piracy Unauthorised downloading of multimedia o You still aren’t supposed to make backups in Australia of software you’ve purchased Issues not clearly covered by © law • Page 123 • Analyse the 5 dot points • Discuss with class A process for analysing ICT issues • Analyse the stakeholders and the uses of the information technology being used. Software Acquirement on the Internet Software company Programmers Adv Advertising Trial versions DIS Loss of sales Downloaders Adv Advertising Trial versions DIS Loss of royalties, revenue for work Adv Free, easy access programs DIS Possible virus from download Make your own stakeholders flow chart for another ICT issue Solution Example Software Acquirement on the Internet Educate users ADV Appeals to people’s morality DIS People will still download Index Primary & Secondary Sources Lightning Quiz Name 3 main areas of Ecommerce • B2B, B2C, C2C What makes Ecommerce successful? Small, easily transported products Electronic services Advantages Disadvantages SPAM? Phishing? Botnet? Issues with disposal of ICT products? What is info privacy? Two most common copyright infringements? Primary Sources • Come from stakeholders usually • Provide data that needs to be processed and analysed to produce information. Secondary Sources • Provide info from others who heave already investigated the issue or provided relevant info. How do you get the data? • Most commonly through surveys or questionnaires • Done face to face, in groups or online • Interviews are the most useful as you can gauge feelings & attitudes Designing Questionnaires Design your questions to produce data that is: • • • • • Of a suitable format Reliable Accurate Timely Free from bias Making a Questionnaire • • • • • • • Research the issue or topic Establish a main focus point List questions that need answers Choose the type of survey instrument Write questions in suitable format Choose a sample of people to survey Report on the results using visual representations and written feedback Questions: Open or Closed • Closed Qs = yes/no, one word responses or multiple choice • Open Qs = require a longer response. using what, why, when, how, explain, describe, ect... This makes a question open. Conducting Interviews / Questionnaires Interviews: • Usually one to one basis • Recorded (with permission) Questionnaires • Individually or in groups • Paper, computer or internet based Data Validation • Easy for errors to occur during input phase • Use manual and electronic validation methods • Manual methods? • E.g. Proofreading • Electronic methods? • E.g. Drop downs • Both used to ensure accurate input Analysing Questionnaires / Interviews o Time consuming o Interviews need to be transcribed o Answers need to be summarised o All answers transferred to master copy. o Overall summaries made o Analyse data, record trends and findings o Reach a conclusion based on your original goal Referencing Primary Sources • They need to cited or referenced the same way secondary sources are. • Once analysis has been done and a conclusion reached, it becomes a secondary source • Can be turned into a graphical representation Make your own Questionnaires • Make a paper based questionnaire on a topic of your choosing. • Must have 10 questions minimum Make your own Questionnaires • Make an interview • Must have 10 questions minimum • Conduct the interview on a fellow class mate Analyse the information • Sort the info and state your findings • Make your conclusions Secondary Sources • Traditionally books newspapers & journals • Now it’s online text documents, audio and video. • Use search engines to find what you need • Secondary sources: • Wikipedia • YouTube Metasearch engines • Cluster results into groups • Results can give you a broad selection of material you can browse Check the Quality • • • • • • Is it clear who’s written it? Are the aims of the site clear, Bias? Is it relevant? Can the info be checked? When was it produced? Up to date? Does it give all the options? Referencing • All sources used need to be referenced in a bibligoraphy • Heaps of styles: APA, Harvard, MLA, Oxford • Styles change depending on what it is you are referencing • Eg, a journal is referenced different from a book, online document or web site. Referencing Examples Harvard: Book reference Bessant, J & Webber, R 2001, 'Policy and the youth sector: youth peaks and why we need them', Youth Studies Australia, vol. 20, no. 1, pp. 43-47. APA: Electronic Journal Reference • Kavanagh, K., Absalom, K., Beil, W., & Schliessmann, L. (1999). Connecting and becoming culturally competent: A Lakota example. Advances in Nursing Science, 21, 9-31. Retrieved March 26, 2001 from ProQuest/Nursing Journals database. Wait for it.... Congratulations This is the end of the chapter ICT in the global society is no more.... Until the exam