• LOGIN
  • No products in the cart.

CS6: Emerging Technologies

Sub Topic 3. Emerging   Technologies

New Emerging Technologies of 21st century in 2022 - Webbybutter

Sub topic Objectives:

  1. Emerging technologies

explain the concept of  emerging technologies (artificial intelligence, digital forensics, among others).

  1. Application areas of specific emerging technologies

explain how specific technologies are applied in problem-solving in society.

  1. Implications of emerging technologies

explain advantages and disadvantages.

Emerging technologies

Emerging technologies | HellenicOCRteam

Definition: Emerging technologies are those that are currently being developed or will be developed in the next 5 to 10 years, and which will alter the business and social environment. ICT is always improving and changing and new technologies are being developed all of the time. Developments in technology will, by nature, impact on our everyday lives and these include:

  • –Artificial Intelligence (AI)
  • –Digital forensics
  • –Biometrics
  • –Robotics
  • –Quantum Cryptography
  • –Computer Assisted Translation (CAT)
  • –3D and Holographic Imaging (aka holograms)
  • –Virtual Reality

Application  areas and impacts of some emerging technologies

Artificial Intelligence (AI)

This is a computer science that is focused on creating computer systems that simulate human intelligence. The term was first used in 1956 by a computer scientist at the Massachusetts Institute of Technology (MIT) who was focused on trying to make computers behave like humans.

AI is being developed in the following application areas: 

  • Expert Systems – These are computers that have been programmed to make decisions based on information they are given. For example: Medical expert systems can diagnose patient’s illnesses based on symptoms entered.
  • Languages – This type of AI involves computers that can understand different human languages as they are spoken to them.
  • Robotics – Robotic artificial intelligence is where machines are programmed to imitate a human.
  • Game Playing – Computers developed to play games against human players. For example: In 1997 a computer named ‘Deep-Blue’ defeated a world champion in the game of chess.

Impacts of AI on everyday life: 

  • Accurate prediction of weather – AI software will soon be used to sift through weather data more accurately that humans can and will be used to predict approaching storms and automatically issue warnings.
  • Increased leisure time – Robotic vacuum cleaners are becoming more and more popular. These can detect walls and other objects in order to vacuum around them. People can leave them running whilst they enjoy extra spare time.
  • Safer transport – Self driving cars already exist will drastically reduce road accidents. Driverless trains too already exist in some countries!
  • Increased Personal safety – Modern home alarm systems use artificial intelligence software that can tell the difference between the home owners and intruders. The software automatically alerts the police when intruders are detected.
  • Improved medical care – Robotic surgery assistants are being used to quickly and accurately pass the correct surgical tools to doctors. The few seconds saved in getting the correct tool to the doctor can save patient’s lives.

Digital forensics

Digital forensics, also called computer forensics, network forensics, or cyberforensics, is the discovery, collection, and analysis of evidence found on computers and networks. Digital forensics involves the examination of computer media, programs, data and log files on computers, servers, and networks.

Many areas use digital forensics, including

  • –law enforcement,
  • –criminal prosecutors,
  • –military intelligence,
  • –insurance agencies,
  • –Tax investigations and
  • –information security departments in the private sector.

Impact of Digital Forensics on everyday life:

Forensics has led to increased legal use of digital evidence. Digital evidence is information found on a wide range of electronic devices that is useful in court because of its probative value.

Technology changes evidence. There is still a vigorous debate in the legal world over the usage and reliability of DNA evidence, for example. This is now being mirrored in more recent court challenges over the use of digital evidence.

Digital evidence tendered in court often fails to meet the same high standards expected of more established forensics practices, particularly in ensuring the evidence is what it purports to be. It is increasingly common for criminal trials to rely on digital evidence. And, regrettably, it is common for innocents to be convicted and guilty people acquitted because of digital evidence.

Biometrics

What is biometrics?Biometrics is where parts of a person’s body are used for identification purposes. Examples include:

  • Fingerprints – These are impressions embedded at the end of human fingers and thumbs. Fingerprints kept in a database can be matched to those left at crime-scenes to help identify the culprit.
  • Eye recognition – Eye scans analyse the iris which is the coloured ring that surrounds the pupil.
  • Face recognition – This is where the shapes of individual’s faces are analysed.
  • Voice recognition – Pitch, tone and frequency of voices are unique and can be analysed to identify people.
  • All of these parts of the human body are unique from person to person and can be used to authenticate identity. Even identical twins have slightly different fingerprints and voices etc.

Impacts of Biometrics on everyday life:

  • Better airport security – Iris recognition is already in use in some airports. Travellers have their eyes and iris scanned into a system and this data is later matched up when the person is performing airport checks.
  • Increased building security – Fingerprint access to buildings have been replacing the older methods of locks and keys. This method ensures that only authorised people can enter restricted buildings or rooms.
  • Reduced car theft – Cars already exist that use fingerprints to only unlock their doors or start the engine for the fingerprint that is registered. This means that the doors will not unlock for a print that is not recognised and makes the car harder to steal.
  • More secure mobile phones – Mobile phones contain our lives. We used our phones for everything from social media to shopping online. They need to be as secure as possible in order to protect the valuable data that they contain. Apple recently released an iPhone model that uses a fingerprint reader to identify the true owner of the phone. It will not unlock for a fingerprint that it does not recognise

Robotics

Robots are increasingly being used in manufacturing due to their proven increase in productivity. Think about it! Robots can work 24/7 and never need to take breaks. They also do not require wages like humans do. This means that robots can produce more at a lower cost. They are either automated (controlled by a computer chip) or manually controlled by a human.

Robotics (B. Eng.)

Some more typical tasks that robots can be used for are described in the table below:

  • Dangerous jobs – E.g. disposing of bombs, spray painting or cleaning up nuclear waste. Note: these are all jobs that could harm or kill a human.
  • Exploring extreme environments- E.g. inside volcanoes, planets or the depths of the ocean. Note: humans cannot visit these environments due to lack of oxygen and high pressure / heat levels.
  • Repetitive manufacturing jobs – E.g. production lines, packing and welding etc.
  • Note: these jobs can also be performed by humans but robots can do them much faster and more efficiently.
  • Moving heavy objects – E.g. installing large engines, moving pallets of items etc.

Impacts of Robotics on everyday life: 

  • Increased personal time – If robots can carry out domestic chores, this frees up more time for us to spend as we wish.
  • This could mean more time spent at work or for more enjoyable activities such as socialising.
  • More efficient manufacturing   Robots can manufacturer products such as cars much faster and cheaper than humans can. This means that companies can make more products at less cost and this means greater business profits.
  • Loss of jobs Due to higher and cheaper productivity, robots are taking over the manufacturing jobs that used to be carried out by humans. This means that humans are missing out on employment on assembly lines and factory work.
  • Safer working environments – Robots can safely carry out tasks that are too dangerous for humans. For example: spraying cars with toxic paint, defusing bombs on battlefields and search and rescue operations in buildings destroyed by earthquakes

Quantum Cryptography

  • Quantum cryptography (encryption) is an emerging technology that allows messages and data to be sent with complete privacy.
  • Note: Encryption is where digital data and files are scrambled so that only authorised people are allowed to read it.
  • Unauthorised people attempting to read the data would see illegible nonsense instead of the real information. Older methods of encryption were based around mathematics but quantum cryptography uses physics instead.
  • This makes the encryption impossible to break.
  • In quantum cryptography, messages are encrypted using photons. Photons are tiny packets of light.

Impacts of Quantum Encryption on everyday life: 

  • Completely secure voting Citizens of countries have the right to vote-in new governments but history is littered with examples of where these votes have been tampered with in order to influence election outcomes. Securing votes with quantum encryption methods ensures that they cannot be tampered with or changed.
  • Completely secure communication – Messages sent by the military often include the locations of squadrons or special op’s teams. If enemy forces intercepted these messages it could have severe consequences. Using quantum cryptography to secure the messages would eliminate the risk of them being read or heard by unauthorised ears.
  • Completely secure bank transfers – Any electronic transfer of money, such as at ATM’s or buying goods online, will be completely secure. Some banks are already using quantum cryptography for the purposes of securing money transfers.
  • Completely secure personal information – Health records, bank details and other types of personal information will be absolutely secure from hackers and other people wishing to commit identity theft crimes.

Computer Assisted Translation (CAT)

CAT is where a human translator uses computer software to help in the translation process. CAT software can reduce the amount of time that the translation takes. Current CAT tools are not always 100% accurate. They need a human to check for errors.

Examples of different types of CAT tools include:

  • Spell checkers – These are usually built-into word processing software and can automatically flag-up spelling errors and suggest translations of miss-spelt words. NOTE: Most word-processors now allow the user to select the language in which to spell-check.
  • Translation memory software -Translation memory software are databases which store translated text as the human translator works through it in order to be reused in the future. Translated text is built-up in the database’s memory and can be accessed by other translators in order to speed up their translation jobs.
  • Language search-engine software – These are Internet based systems which allow translators to enter any text that they want translating and also to select which language they want the text translating into. The software will then search through a large collection of translation memory databases to try and find a match with the text entered into the search engine.If a match is found, translated text will be shown on-screen.

Impacts of Computer Aided Translation on everyday life: 

  • More accurate documents Spell checkers can quickly scan your word processed documents and automatically find spelling errors. Miss-spelt words can be quickly corrected to produce an error-free document.
  • A more multilingual society Anyone with an Internet connection can access tools such as Google Translate and the vast collection of language databases that the tools can search through. This makes accessing other languages much easier than in the past and makes it easier for people to learn these new languages.
  • NOTE: Google’s new ‘Voice Search’ facility allows users to actually speak into a tablet or mobile phone and Google will automatically translate (and speak) the words or phrase in almost any language.
  • Quicker and more efficient translations Foreign visitors to countries can be communicated with much easier through these CAT tools. They are especially useful in places like embassies where a wide-range of foreign visitors may need to communicate with local officials about problems or ask for advice etc.

3D and Holographic Imaging (aka holograms)

  • This is a technique where images are made to appear three-dimensional and to actually have depth. Holograms work by taking two regular two-dimensional images of the same object and laying one on top of the other.
  • The two-dimentional images need to have been shot at different angles.
  • Two different types of laser beams are used to record the two-dimensional images onto a single photographic plate. This creates one single image that incorporates the angles of the original two-dimensional images. This produces a 3D effect. When viewing the image, human eyes see it from slightly different angles. The brain combines them into a three-dimensional image.

Impacts of 3D imaging on everyday life: 

  • Improved security – Credit cards, ID cards, software and some bank notes include holograms as a way of trying to prevent forged duplicates being created. NOTE: Forgeries don’t usually include a hologram as they are difficult and expensive to reproduce.
  • Better movie experiences -Hollywood have been using 3D imaging within the production of movies for many years. These provide the viewer with a much more immersive experience. NOTE: 3D movies require the viewer to wear special glasses for the effect to take place. The glasses project two images shot at different angles (one in each eye) and your brain puts them together as one 3D image.
  • Greater data storage – It is thought that the technology behind holograms will eventually be used to provide the means to store large amounts of data. Companies have already produced discs that use holographic layers that each have the potential to hold a massive 3.9 terabytes. NOTE: This is the equivalent of over 150 standard Blu-ray discs.

Virtual Reality

Virtual reality is where computers are used to create an artificial environment that users can interact with as if it were real. Virtual reality is not really meant for gaming purposes. It is used for more serious purposes such as: Allowing architects to walk around a virtual version of their design (this gives a better idea of what the finished building will look like). Training soldiers in combat (flight simulation, battlefield simulation). Training surgeons (virtual patients can be operated on to provide experience to trainee surgeons).

What Is Virtual Reality? | Tech & Learning

As they walk around the virtual environment users will experience things in a similar way to the real world. For example:

  • Objects get smaller as you walk away from them (and bigger as you move closer)
  • The direction of sounds change as you move around
  • Objects in the virtual world appear the same dimensions as they would in the real world (for example dogs are smaller than us but elephants are bigger).

Impacts of Virtual Reality on everyday life:

  • Improved medical surgeons – Surgeons can be trained using virtual patients. This allows them to practice over and over until they have perfected a particular surgery without risk to a real patient.
  • Safer and stronger buildings – Virtual buildings allow architects to walk around to experience what the building would look like when completed and check for potential errors before the actual building is constructed. This allows architects to modify designs quickly and cheaply and will, potentially, allow for the development of much larger and safer buildings than we currently have.
  • More effective treatment of phobias – VR is being used to help patients overcome phobias and anxieties. People can experience a tame, controlled version of what they are afraid of. Slowly the person becomes used to the situation and can relax.
  • Training in dangerous situations – VR can be used for training in dangerous situations where it is impossible to practice the real thing. For example: A large fire in an office building could never be set up in reality, but it could in a virtual environment. This will allow workers to practice emergency evacuation in a safe environment.
  • More realistic education – VR can give students the opportunity to learn in a much more interactive way. For example: Astronomy students can learn about the solar system by engaging with the objects in the virtual environment.

Sub Topic 4. ICT Industry

Sub-topic Objectives:

  • Careers in the ICT industry

explain the meaning of careers in the ICT industry.

appreciate careers in the ICT industry.

  • ICT in SMEs

identify the potential of ICTs for earning.

Careers in the ICT industry 

ICT industry: Information and communication technology (ICT) has created new job titles such as computer operators, computer technicians, system analyst, computer programmers, software engineer, information systems manager, data base administrator, computer trainer, web administrator, computer graphics designers, system administrators and network administrator.

Meaning of careers in the ICT industry

System analyst: This a person who is responsible for analyzing a company’s needs or problems then designs and develops a computer based information system.

Some of the responsibilities of a system analyst include:

  • Reviewing the current manual or redundant information system and making recommendations on how to replace it with a more efficient one.
  • Working with programmers to construct and test the system.
  • Coordinating training for users of the new system.

A good system analyst is one who has at least the following attributes;

  • Good problem solving skills and creativity, ie. Must have wide experience in solving problems.
  • Good communication skills: The analyst must be able to communicate clearly and precisely both in writing and in speech. He/she must be able to talk to different groups of people e.g managers, operators, attendant and general public.
  • Must have business knowledge: the analyst must clearly understand the environment for which the system is being developed.
  • Technical knowledge: A system analyst must be well trained in relevant areas of computer science such as hardware, software programing knowledge.

Computer operator: Some of the responsibilities of a computer operator include; Entering data into the computer for processing. Keeping up-to-date records (log files) of all information processing activities.

Computer technician: Given that computers require regular maintenance, upgrading as well as emergency repairs, demand for computer technicians continues to grow as more people computerize their workplaces and homes.

Some of the responsibilities of a computer technician are;

– Troubleshooting computer hardware and software related problems.

–Assembling and upgrading computers and their components.

–Ensuring that all computer related accessories such as printers modems, storage media devices are in good working condition.

Computer engineer: Computer and electronic engineers are coming up with new and more efficient technologies in information and communication technology almost daily. Since computers are electronic devices, hardware designers must be good in electronic engineering in order to be able to:

  • Design and develop computer components such as storage devices, motherboards and other electronic components.
  • Determine the electrical power requirement of each component.
  • Re-engineer computer components to enhance its functionality and efficiency.
  • Design and develop engineering and manufacturing computer controlled devices such as robots.

Computer programmer: Large organizations such as insurance companies, banks, manufacturing firms and government agents hire programmers to work together with system analysts in order to:

  • Develop in house application programs or system programs.
  • Customize commercial application packages to suite the organization needs.
  • Install, test, debug, and maintain programs developed or customized for the organization.

Web administrator/webmaster

A web administrator is responsible for:

  • Developing and testing websites.
  • Maintaining, updating and modifying information on the website to meet new demands by the users.

Software engineers: Most Software engineers analyses user needs and create application software. Software engineers usually have experience in programming, but focus on the design and development of programs using the principles of mathematics and engineering.

Computer Trainers: Computer trainers typically teach new users how to use the computer software and hardware.

Network administrator: A network administrator is a specialist whose responsibilities are to:

  • Set-up a computer network.
  • Maintain and enforce security measures on the network.
  • Monitor the use of network resources.
  • Maintain and troubleshoot network related problems.

Graphic designers: A graphic designer is a professional within the graphic design and graphic arts industry who assembles together images, typography, or motion graphics to create a piece of design.

System Administrators: A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers.

Other responsibilities of an information system administrator include;
The system administrator seeks to ensure that the uptime, performance, resources, and security of the computers he or she manages meet the needs of the users, without exceeding the budget.

A system administrator may acquire, install, or upgrade computer components and software; provide routine automation; maintain security policies; troubleshoot; train or supervise staff; or offer technical support for projects.

ICT in SMEs

–Small and medium enterprises (SMEs) are independent firms and companies which tend to have fewer employees and lower sales volume compared to large firms and companies. Different definitions are given from different organizations and countries. For example, the Organisation for European Economic Cooperation (OECD) and European Union (EU) designate the upper limit of employees for SME as 200 employees.

–Researchers have increasingly focused on the adoption and use of ICT by small and medium enterprises (SMEs) as the economic development of a country is largely dependent on them. Following the success of ICT utilisation in SMEs in developed countries, many developing countries are looking to utilise the potential of the technology to develop SMEs

Role of ICT in SMEs

  • Innovation and productivity. ICT assists businesses to be more responsive to innovation opportunities and provides significant efficiency gains.
  • Open and closed innovation. SMEs survive the competitive environment based on the innovation driven by ICT.
  • Economic role. ICT in economics plays two important tasks, which are strategic management and cost reduction.
  • Entrepreneurship role. ICT enables closer links between businesses, suppliers, customers and collaborative partners.

Policies regarding adoption of ICT in SMEs

  • The organisations should consider these factors for adoption of ICT in SMEs.
  • E-commerce / E-business: Shift to a wider view of e-commerce integration of internal and external processes.
  • Staff ICT training. Training programmes for SME managers and employees focussing on both ICT and managerial skills need to be provided in cooperation with business and sector organisations, training institution and commercial training services.
  • Privacy issues. Address security, trust and confidence through broad policy frameworks, regulatory and self-regulatory tools, trustworthy technologies and affordable redress mechanisms.
  • E-governance. Use e-government initiatives to provide incentives for SMEs to go on-line by simplifying administrative procedures, reducing costs and allowing them to enter new markets.
  • Growth analysis. Expand collection and analysis of increasingly available statistics on e-business and e-commerce to monitor progress and improve cross-country analysis.

Challenges of ICT adoption

  • Technical Support challenges. In developing countries like Uganda, SMEs often lack the human technological resources needed for ICT implementation. Without internal technological capabilities, utilisation of ICT applications might be difficult and sometimes dangerous in terms of system maintenance and failures. The opposite is to seek advice and support from IT professionals, but most SMEs do not simply afford to do that because of the relatively high cost.
  • Lack of awareness- uncertainty of ICT benefits, set-up costs and pricing issues and security concerns are the most visible barriers to ICT
  • Managerial challenges. From managerial perspective, SMEs may also lack the managerial understanding and skills. ICT adoption projects are complex in nature and cannot be successfully implemented without relevant skills and a visionary mindset.
  • Administrative challenges. The decision-making process of the managers is rather intuitive, based on instinctive decisions and is less dependent on formal models of decision making. They tend not to pass on information and do not delegate decision-making powers to their inferiors.

Case Study: SMEs in Uganda

In Uganda SMEs account for a significant share of production and employment and are therefore directly connected to poverty alleviation. While in many respects the Ugandan economy is different to that of other countries in the continent, for the poor population in the rural areas SMEs are also very relevant for employment and as an income source. Especially in developing countries like Uganda, SMEs are challenged by the globalisation of production and the shift in the importance of the various determinants of competitiveness.

Why government encourages SME access to and use of ICTS:

The SME play a key role in national economic development strategies by facilitating flows of information, capital, ideas, people and products.

The problem at hand in Uganda

Most SMEs in Uganda, do not appreciate the importance of using ICTs and e-business in the performance of their businesses. There is therefore need to establish the factors that have led to this reluctance towards the application of ICTs in the business processes of SMEs in order to exploit the benefits of these modern technologies which can be easily implemented for improved performance, cost reduction, competitive advantage and many others.

Comparatively, medium-sized enterprises have made attempts to put ICT strategies in place. The medium-sized enterprises attach great value to information compared to small-sized enterprises perhaps because they have significant investments.

ICTs commonly used by SMEs in Uganda

The ICTs most commonly used by SMEs in Uganda include:

  • Microsoft Office applications;
  • computers;
  • internet access;
  • e-mail communications;
  • telephones;
  • photocopiers;
  • printers; and
  • Websites.

However, unlike SMEs in developed countries, those in Uganda are not fully exploiting the potential of ICT to compete effectively in the international markets. This is because of the following factors:

  • lack of e-business / e-commerce infrastructure;
  • lack of skills to develop and maintain interactive websites; and
  • the use of obsolete technologies.
  • high cost of internet connectivity;
  • security issues concerning payments; and Shortage of skills.

Sources of information used by SMEs

  • SMEs in general obtain information from various sources, including:
  • the internet;
  • head offices;
  • heads of department;
  • brochures;
  • other ICT companies;
  • consultants;
  • training seminars;
  • trade catalogues;
  • visits to relevant offices.

Means of disseminating information by SMEs

SMEs disseminate information through a combination of methods, such as:

  • –e-mail;
  • –memos;
  • –staff meetings;
  • –departmental heads;
  • –newsletters;
  • –annual reports;
  • –websites;
  • –intranets;
  • –workshops;
  • –trade catalogues; and
  • –personal visits.

Information sharing among SMEs

Some of the SMEs have LANs, suggesting that they recognise the importance of information sharing. However, most applications implemented on the LANs are basic, such as e-mail applications, small databases, Microsoft applications, and product information that are largely for in-house use.

Compliance by SMEs with information security procedures

Both small and medium-sized enterprises employ mainly antivirus programmes and regular backups to ensure the security of information. However, medium-sized enterprises in addition use sophisticated information security measures such as:

  • firewalls;
  • regular software updates;
  • offsite storage;
  • authentication;
  • encryption; and
  • audit trails for diagnostics.

Barriers to adoption of ICTs by SMEs in Uganda

Most of the current and potential clients for SMES in Uganda are not connected to the internet, largely because of high costs and a lack of awareness.

The government has not put in place an e-commerce friendly environment, which would build consumer trust and business confidence.

Moreover, the ICT market is not yet mature and people are yet to develop confidence in using ICTs. For example some people still tend to prefer going to the teller in the bank instead of querying and accessing their accounts through internet or mobile banking.

Furthermore, telecommunication cost is high, quality sometimes poor and a barrier to transacting business on the web.

Other barriers include:

  • –limited and poor-quality bandwidth;
  • –lack of security guarantees;
  • –inadequate legislative framework;
  • –frequent internet downtime;
  • –slow internet access;
  • –high taxation; and
  • –inadequate technical support.

Potential of ICTS for earning

Past exam Qn: Mention ways in which you will use the subsidiary ICT knowledge and skills you’ve acquired to earn income during your S6 vacation. (5 mks)

Possible Answers:

  • –Typesetting documents and printing business
  • –Taking on Data Entry jobs
  • –CD/ DVD writing and selling
  • –Provision of internet services
  • –Networking computers for organizations
  • –Desktop Publishing
  • –Computer Software Installation
  • –Computer Hardware Maintenance
  • –Image editing and graphic design
  • –Web page or website development
  • –Blogging
  • –Social Media marketing
  • –Computer Training, etc.

 

Assignment

CS6: Assignment on System Security, ICT Ethical Issues and Emerging Technologies

ASSIGNMENT : CS6: Assignment on System Security, ICT Ethical Issues and Emerging Technologies MARKS : 100  DURATION : 3 hours

 

Courses

Featured Downloads