For internal use of KMB students only
Strand 3: IT systems
Introduction
The internet and World Wide Web are omnipresent in contemporary society. This topic introduces ITGS students to the technology that enables access to the internet. The tools and applications that contribute to the creation of web-based resources and websites are addressed under topic 3.6, “Multimedia/digital media”.
The use of the internet for activities such as e-commerce, academic research and social networking can raise ethical issues and have positive or negative social impacts. These may include exposure to undesirable materials, cyber-bullying, e-fraud, improved communication between individuals and groups, intellectual property theft, plagiarism, spamming and the global dissemination of ideas. Students are expected to discuss, where appropriate, possible solutions to a specified problem and evaluate their effectiveness.
Possible scenario
A school is considering using the internet to enhance the learning opportunities of its students. Before making a final decision it intends to obtain an outline of the different facilities available. It must also consider the potential problems of opening this “window on the world”. Where appropriate, the ITGS student should investigate different environments to experience the range of available learning opportunities. This may include research using different collaborative websites, educational websites or online sources of information.
IT concepts to address in this topic
Fundamental
WWW (World Wide Web), URL (uniform resource locator), internet, intranet, extranet
Internet protocols: for example, HTTP (hypertext transfer protocol), HTTPS (hypertext transfer protocol secure), FTP (file transfer protocol), TCP/IP (transmission control protocol/internet protocol)
IP address
Modem, browser, internet service provider (ISP), bandwidth, download, upload, streaming audio/ video, compression, decompression, cache
Domain names, domain name system (DNS)
Features of a website: for example, hyperlinks, navigation, metatags, tags, forms
Features of a browser: for example, bookmarks, visited links, tabs
Web-based languages: for example, hypertext markup language (HTML), JavaScript
Adding functionality to a browser (for example, plug-ins)
Data-driven websites: for example, active server page extended (ASPX), personal home page (PHP)
Site management: for example, web hosting, uploading
Other site use: for example, bounce rate, click-through rate (CTR), avatar, profile
Tools
Search engines, web crawler/spider, search directories, search techniques, filtering, keyword density, keyword prominence, ranking of sites
Social networking: for example, newsgroups, message boards, chat rooms, forums, instant messaging
Email, email server, list server
Web 2.0, Web 3.0 and beyond, collaborative online tools: for example, wikis, blogs, micro-blogs, RDF (resource description framework) site summary feeds, RSS (really simple syndication) feeds, mashups, forums, social bookmarking, online collaborative applications, podcasts, photocasts, vidcasts, social networking sites, templates, tagging, viral marketing, webcasts, widgets, virtual worlds and learning environments
Web databases, encyclopedias
Services
Online advertising and marketing technologies: for example, banners, pop-ups, cookies
Push–pull technologies: for example, email newsletters
Content management systems: for example, Moodle, Blackboard
E-commerce technology: for example, business-to-business (B2B), business-to-consumer (B2C), consumer-to-consumer (C2C), payment services, secure transactions
The World Wide Web Consortium (W3C)
Internet threats and security
Internet security: for example, firewall, proxy server, SSL (secure sockets layer), encryption, public and private keys, digital signatures
Internet threats: for example, global viruses, hackers, spam, phishing, pharming, spyware, adware
Practical techniques
Collaborative online tools: for example, wikis, blogs, RSS feeds, mashups, forums, social bookmarking, online collaborative applications, podcasts, photocasts, vidcasts, social networking sites, templates, virtual worlds and virtual learning environments
ASSESSMENT PRACTICE
Assessment objective 1: Knowledge and Understanding
Identify two features of spyware.
spyware collects data/information about a person, such as internet surfinghabits, passwords, log in details, monitors keystrokes / keylogger, accesses data stored on the device
spyware is hidden from the user/is anonymous - the user is not aware of its presence (hence the name: it is like a spy) and has not given consent
spyware can have different functions
some spyware only collects data and monitors what the user does
others can install additional software
start controlling the computer (for example hijacking the modem, controlling the camera etc.)
can weaken the computer security by disabling firewalls and antivirus software
can detect when the user is engaged in suspicious activity
can access the content of emails sent and received
spyware can take different forms such as adware or trojan horses
spyware is usually regarded as malicious and harmful, but not always, for example when used by law enforcement and security/intelligence agencies
spyware is installed on a user’s computer without their knowledge. Note to examiners: The question stem does not make a clear distinction between “spyware” and “monitoring software”. The terms should therefore be regarded as equivalent/synonymous in candidates’ responses.
Award [1] for identifying each feature of spyware up to a maximum of [2].
Assessment objective 2: Application and analysis
The developers of Qustodio decided to use automated keyword detection to monitor for signs of cyber-bullying.
Analyse this decision.
Advantages of using automated keyword detection
the suspicious message could be stopped even before it appears on the
automated keyword detection is immediate and can instantaneously draw parents’ attention to suspicious messages and their authors
there is no need for parents to read through all the messages
the system may help discourage children who know they are being monitored from sending suspicious messages.
Disadvantages of using automated keyword detection
some terms may be wrongly detected as sign of cyberbullying when in fact they are innocuous in context
some people may use alternative spelling or leetspeak to go around this issue, for example “I8u” for “I hate you”. Teenage language evolves more rapidly than the software could incorporate new keywords
cyberbullying is not just about words but also tone, style, intention, sarcasm, which automated keyword detection could not spot
not all cyberbullying is carried out through text (e.g. image-based) so a key word detector would not be effective in these cases
the software might only be able to detect keywords in certain commonly-spoken languages.
Assessment objective 3: Synthesis and evaluation
To what extent is it acceptable for parents to use apps such as Qustodio and TeenSafe to monitor their child’s online activities?
Reasons why it is acceptable
parents may want to control the contents of websites that their child is going toaccess
parents may be worried about who contacts their child online and what messagesthey exchange/gives parents a sense of relief of knowing what their child is up to
parents are responsible for the safety and wellbeing of their child and feel it is theirduty, as parents, to monitor their child’s online activities
parents pay for the mobile devices, in most cases, so they feel that have the right toknow how, when and for what purpose the devices are used.
Reasons why it is not acceptable
children have a right to privacy, which these apps refute and deny
the use of apps could involve data being sent to the app developers whichpotentially introduces new privacy issues
children may not know that their parents monitor their messages and onlineactivities, which can be detrimental to trust and honesty within the family
there is no consent: the children may not be asked whether they agree or not
younger children may need to be protected, but teenagers may feel they have aright to exchange messages in all confidentiality with other people, without theirparents spying on them.
Marking note: Do not accept references to hacking. The question is about the acceptability of parents monitoring their child’s online activities