KEMBAR78
UNIT 1 Lesson 1 | PDF | Identity Theft | Investing
0% found this document useful (0 votes)
8 views48 pages

UNIT 1 Lesson 1

This document provides an introduction to information technology applications in business. It discusses 10 technology trends that will influence business, including the growth of artificial intelligence, internet of things, edge computing, quantum computing, aerospace technology, 5G internet, health care predictions, agriculture technology, autonomous vehicles, and blockchain usage. It also covers the positive and negative impacts of technology on business operations, costs, security, communication, productivity, customer reach, and collaboration. Additionally, it discusses credit card fraud and identity theft, consequences of unsafe technology use, and digital content and copyright laws.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views48 pages

UNIT 1 Lesson 1

This document provides an introduction to information technology applications in business. It discusses 10 technology trends that will influence business, including the growth of artificial intelligence, internet of things, edge computing, quantum computing, aerospace technology, 5G internet, health care predictions, agriculture technology, autonomous vehicles, and blockchain usage. It also covers the positive and negative impacts of technology on business operations, costs, security, communication, productivity, customer reach, and collaboration. Additionally, it discusses credit card fraud and identity theft, consequences of unsafe technology use, and digital content and copyright laws.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 48

Introduction to IT

Application in Business
PRESENTED BY: JEFFREY CERVANTES
OBJECTIVES
At the end of the lesson, students will be able
to:

▶ Differentiate credit cards fraud and identity theft.


▶ Identify the consequences of unsafe, illegal, and unethical use
of Technology Systems.
▶ Know the proper use of digital content and copyright laws used
in this context.
▶ Distinguish the proper way of budgeting, saving and investing using
technology systems.
▶ Be familiar with different kinds of loans and its effects.
▶ Know about commerce and information technology terminology
Trends and Impact of Technology in
Business

As time flies, there are more and more new technologies


emerging when it comes to business matters. Men are creating
these technologies to make things easier. Anis Uzzaman from
Pegasus Tech Ventures states in his article ten (10) top
technology trends that will influence us
Trends and Impact of Technology in
Business
▶ Trend 1: Breakout moment of artificial intelligence (AI) in manufacturing.
▶ Trend 2: Practical deployment of Internet of Things (IoT).
▶ Trend 3: Increased demand for edge computing processing power.
▶ Trend 4: Commercialization of quantum computing usage in mass scale.
▶ Trend 5: Evolution of aerospace technologies.
▶ Trend 6: New era of the internet — deployment of 5G and Starlink broadband
internet technology.
▶ Trend 7: Evolution of health care — predictions at the genome level.
▶ Trend 8: Evolution in Agriculture – technology to Grow Crops Efficiently.
▶ Trend 9: Evolution of autonomous driving technology.
▶ Trend 10: The U.S. and China put blockchain to practical use.
Trends and Impact of Technology in
Business
From another article “The Impact of Technological Change on Business
Activity” of Osmond Vitez, he discussed different technological change impact
to business activity.
These impacts are:
▶ 1. Impact on Operating Costs
▶ 2. Securing Sensitive Information
▶ 3. Improved Communication Processes
▶ 4. Increased Employee Productivity
▶ 5. Broaden Customer Bases
▶ 6. Collaboration and Outsourcing
Looking at these trends of technology when it comes
to business, we can clearly see the positive side of
using the technology. In this lesson the pros and cons
of using the technology will be discussed.
Credit Cards Use and
Identity Theft
Credit Cards Use and Identity Theft

Using credit cards are usual nowadays. A person can easily do transactions
with credit card. But there can be a consequence of using credit card
specially when the user is not careful with his or her information.

There are articles that explains the difference between credit card fraud and
identity theft. One of the writers which explain it clearly is Ben Luthi in one of
his articles. He states that Credit card fraud is a form of identity theft but it is
typically only affecting one or more of the victim's open credit card accounts.
Credit card fraud occurs when a thief gets his or her hands on a victim's
credit card information.
Credit Cards Use and Identity Theft

Luthi enumerates that thieves can do this by:

▶ Using a skimming device at an ATM or gas pump.


▶ Pulling data from files stolen in a data breach.
▶ Gaining access to an online account where the information is
saved.
▶ Eavesdropping on an unsecure Wi-Fi network or website.
▶ Deploying phishing emails, phone calls or text messages.
▶ Stealing the physical card from your purse or wallet.
Credit Cards Use and Identity Theft

On the other hand, he explains identity theft is an umbrella


term that encompasses any crime where someone wrongfully
accesses and uses another person's personal information for
economic gain. While credit card fraud is one form of identity
theft.
Credit Cards Use and Identity Theft

Luthi specified that Identity thieves can steal your data in several ways,
including:

▶ Getting it from files stolen in a data breach.


▶ Gaining access to an online account where the information is saved.
▶ Eavesdropping on an unsecure Wi-Fi network or website.
▶ Deploying phishing emails, phone calls or text messages.
▶ Stealing your mail.
▶ Rummaging through your trash for documents with sensitive information.
▶ Stealing your wallet or purse.
▶ Using personal information, you post online.
Credit Cards Use and Identity Theft
On Lisa Rogak article, she has given tips on identity theft. These
are:
▶ Thieves don’t need your credit card number in order to steal it.
▶ The nonfinancial personal information you reveal online is often enough for a
thief.
▶ Be careful with your snail mail.
▶ Review all bank and credit card statements each month, preferably once a
week.
▶ If an ATM or store terminal looks funny, don’t use it.
▶ Identity thieves love travelers and tourists.
▶ Identity thieves are sneaky; you need to be sneaky, too.
▶ Pay attention at the checkout line.
▶ Go paperless in as many ways as possible.
▶ File a fraud alert.
Consequences of unsafe,
illegal, and unethical use
of Technology Systems
Consequences of unsafe, illegal, and
unethical use of Technology Systems

Everything that we do has its consequences either positive or


negative. For some reason a person can unsafe and illegal
things to technology. From Kimberlee Leonard’s article she lists
down the five unethical uses of computers.
Consequences of unsafe, illegal,
and unethical use of Technology
Systems
▶ 1. Media Piracy – Digital media piracy is a prominent unethical practice
undertaken with computers.
▶ 2. Ransomware Attacks – The hacker encrypts the entire website, shutting
the business down until the business owners pay the hackers a fee – the
ransom – in what is called a denial-of-service attack.
▶ 3. Identity Theft – Hackers obtain everything from names, dates of birth
and Social Security information to addresses and other contact information
that is used to create phony accounts.
▶ 4. Financial Theft – Hackers don't steal the information but instead hack
systems to divert financial information input away from the company to
steal money.
▶ 5. Intellectual Property Theft - Intellectual property theft is often achieved
by internal moles or contract workers who have access to a company's
computer server.
Consequences of unsafe, illegal, and
unethical use of Technology Systems

In Damarious Page point of view in his article, he enumerated the


impact of unethical behavior in Technology.

▶ Organizational Integrity
People hesitate to use an organization's Internet-based and e-
commerce services if concerns exist about the integrity of these
systems. The security breaches can occur at the hands of
wayward IT employees within an organization, as well as in the
form of hackers outside the company's firewalls.
Consequences of unsafe, illegal, and
unethical use of Technology Systems

▶ Industry Integrity
Unethical behavior by IT personnel or hackers can bring entire
industries to a halt, either delaying services or shutting down
operations.
One example is a hospital and the healthcare industry are
making a push to digitize patient care and medical records.
Paper documentation is falling by the wayside. Many vital
industries have data backup plans in place, but downtime can
deal a crippling financial blow.
Consequences of unsafe, illegal, and
unethical use of Technology Systems

▶ Academics, Research and Development


Existing IT professionals who perform malevolent activities that
negatively affect an industry might inadvertently disrupt the
supply chain of new talent from colleges.
An example is, business that have suffered setbacks because of
unethical behavior within the IT department may put a freeze
on new IT hiring, which would affect the number of jobs offers
graduating IT students receive out of college.
Consequences of unsafe, illegal, and
unethical use of Technology Systems

▶ Societal Impact
You may hear the terms "developed nations" and "developing
nations" mentioned in relation to computers and Internet
technologies; IT professionals are helping major industrial
countries maintain a standard of living and manage growth,
while emerging economies are using information technology to
lift citizens out of poverty.
Digital Content and
Copyright Laws
Digital Content and Copyright Laws

Digital Content

Digital content is any content that exists in the form of digital


data. Also known as digital media, digital content is stored on
digital or analog storage in specific formats.
Forms of digital content include information that is digitally
broadcast, streamed, or contained in computer files.
Digital Content and Copyright Laws

Types of Digital Media that Are Protected by Copyright

▶ Digital artwork and photographs


▶ Music created digitally
▶ Sound recordings of music, spoken words or other sounds
▶ Motion Pictures and other digital video recordings
▶ Software programs
▶ Websites and website content
Digital Content and Copyright Laws

Copyright

A basic understanding of copyright principles is essential for any


blogger, researcher, reporter, photographer, or anyone who
publishes their creative works. It’s important for two reasons.
First, you should understand how you can properly make use of
someone else’s work – quoting from it, reprinting it, summarizing
it, even satirizing it.
And second, you should understand how you can protect your
own legal rights in what you create, so that others don’t take
unfair advantage of it.
Digital Content and Copyright Laws

What Copyright Covers


First, all copyright law is federal law and therefore uniform across the
country (in theory). States have no role, because the Constitution
gives Congress the sole "power to promote the Progress of Science
and the useful Arts, by securing for limited Times to Authors and
Inventors the exclusive Right to their respective Writings and
Discoveries." Congress first exercised this power to establish copyrights
(and patents) in its first meeting in 1791, and it has regularly revised
and updated the law ever since. Though the last comprehensive
copyright revision was enacted in 1976, Congress has passed many
new copyright laws and amended others – sometimes after highly
contentious lobbying and debate – in the digital era.
Digital Content and Copyright Laws

Second, copyright law covers an extraordinarily broad range of


creative work. The law calls them "works of authorship" but
copyright protects almost all creative work that can be written
down or otherwise captured in a tangible medium:

▶ Literary works – which is basically prose, whether a news


story, scientific paper, novel, poetry, or any other form of
"words-only" (or words-and-pictures) creative work.
▶ Musical works – both the lyrics and the music, whether from
advertising jingles to symphonies.
▶ Dramatic works – plays, including any accompanying music.
Digital Content and Copyright Laws

▶ Pictorial, graphic, and sculptural works – photographs, drawings,


paintings, and any other kind of two- or three-dimensional art.
▶ Motion pictures and other audiovisual works – movies,
television shows, YouTube videos, and any kind of multimedia.
▶ Sound recordings – in addition to the copyright on words and
music (above) a separate copyright protects a recording
artist’s rendition of a work
▶ Architectural works – blueprints and similar plans for buildings.
Digital Content and Copyright Laws

Basic Rules for Copyright Protection of Digital Media Works in the digital media
are subject to the same copyright standard as other types of works:

▶ Only original works of authorship are protected. The work must originate
with the author and must show some amount of creativity.
▶ The work must be fixed in some tangible medium that can be perceived,
reproduced or otherwise communicated, either by itself or with the aid of
a machine. This includes digital media. An idea or a system cannot be
copyrighted.

There are more articles that discussed about digital content and copy right. It
also depends on a particular topic you need to know about.
Budgeting, Saving and
Investing
Budgeting, Saving and Investing

Budget

▶ A budget is a spending plan, a tool to put you in control of


your money. It shows how much money you have, where it
needs to go to meet your needs and wants and when you will
be able to reach your financial goals.
Budgeting, Saving and Investing

To create a budget, follow these


steps:
▶ Step 1: Identify your net monthly income
▶ Step 2: Identify your monthly expenses
▶ Step 3: Subtract your monthly expenses from your
income
▶ Step 4: Assess and rework your budget
Budgeting, Saving and Investing

Saving

▶ Saving should be part of your budget. It is important to put


aside some money each month for savings, if possible. Start
by deciding how much you could realistically save each
month. Once you determine that amount, pay yourself first.
Before you pay bills, set aside money for your savings. Then
pay your other bills.
Budgeting, Saving and Investing

8 simple ways to save money

▶ Record your expenses


▶ Budget for savings
▶ Find ways you can cut your spending
▶ Set savings goals
▶ Decide on your priorities
▶ Pick the right tools
▶ Make saving automatic
▶ Watch your savings grow
Budgeting, Saving and Investing

Investing

Investing is defined by putting your money to work for you.


Essentially, it’s a different way to think about how to make
money.
Investing is buying assets such as stocks, bonds, mutual funds
or real estate with the expectation that your investment will
make money for you.
Budgeting, Saving and Investing

There are many benefits when you start investing including:

1. Meet financial goals faster


2. Build wealth
3. Money habits
4. Compound earnings
5. Combat inflation
6. Opportunity cost
Budgeting, Saving and Investing

Top investments in the Philippines

Securities
▶ company stocks
▶ preferred shares
▶ corporate and government bonds
▶ treasury bills
▶ long term negotiable certificate of deposit
Budgeting, Saving and Investing

Managed funds
▶ mutual funds
▶ unit investment trust fund
▶ exchange traded fund
▶ Personal Equity and Retirement Account (PERA)
▶ variable universal life policy
Budgeting, Saving and Investing

Government savings program


▶ Pag-ibig MP2
▶ SSS Flexi Fund
▶ SSS PESO Fund

Bank products
▶ High-yield savings account
▶ Time deposit
Budgeting, Saving and Investing

Trading
▶ Forex
▶ Cryptocurrency

Small business
Crowdsourcing
Cooperatives
Real estate
Loans and its Effects
Loans and its Effects
What is the impact of taking loans or liabilities?
▶ Purpose of taking these - Liabilities or loans are taken to meet
expenses or to create assets which cannot be funded by regular
income.
▶ Repayments - Loans are generally repaid in monthly instalments so that
the repayment can be done through regular income.
▶ Effect of a liability - A liability leads to a cash outflow from the
future income for the repayment of the loan and the interest,
thereby leaving lesser amount for future expenses and savings.
▶ How they lead to debt traps - Liabilities created to meet regular
expected expenses through personal loans or credit card loans
point to inefficient financial management and lead to debt traps.
▶ When a liability can be beneficial - Liabilities taken to purchase an
asset can be beneficial if the asset appreciates in value over time,
as in the case of a home loan.
Commerce and
Information Technology
Terminology
Commerce and Information Technology
Terminology

Technology Terms for Business Leaders

Computers and the Internet Terms


Tech terms that pertain to the electronic devices and networks
business leaders use every day.
Commerce and Information Technology
Terminology

▶ Algorithm. A set of mathematical instructions that help


computers perform a certain task. Ideal algorithms are as
efficient as possible.
▶ Augmented Reality/Virtual Reality. Both these terms describe
content that alter a user’s perceived reality through the use of
digital tools.
▶ Virtual Private Network (VPN). A secure internet connection
that uses encryption and other measures to ensure network
privacy.
▶ Really Simple Syndication (RSS). Also known as “RDF Site
Summary,” RSS is a method of delivering content on websites in
a standard format known as XML.
Commerce and Information Technology
Terminology

▶ Technology Stack. The collection of software that makes up the


infrastructure of a computer.
▶ Proxy. A router or computer system that disrupts the connection
between the sender and receiver.
▶ Open-Source Software. Software that can be distributed without
restrictions.
▶ Phishing. A technique used by cybercriminals to gain access to
personal user information.
Commerce and Information Technology
Terminology

Operations and Business Systems Terms and E-commerce Terms

Tech terms that pertain to how businesses operate with computer


technology and conduct financial transactions.
Commerce and Information Technology
Terminology

▶ CRM (Customer Relationship Management). The practices


used by organizations to manage and analyze customer data
and interactions.
▶ Payment Processor. A third-party company that processes
financial transactions between buyers and sellers.
▶ Payment Getaway. Software that transmits payment
information between banks.
▶ Electronic Data Interchange (EDI). A common method of
transferring data between computer systems and computer
networks.
Commerce and Information Technology
Terminology

▶ Payment Card Industry Data Security Standard (PCI DSS). A set


of policies and procedures designed to maximize the security
of financial transactions and protect the personal information
of cardholders.
▶ Secure Sockets Layer (SSL). A protocol designed to help send
sensitive information securely over the internet.
▶ Merchant Account. A bank account that enables companies to
own and use credit and debit cards.

You might also like