You are on page 1of 160

Information Society

By: Sir Bornie


Information Society
Information
The Role of Language
Mathematics as the Language of Nature
Technological World
The Printing Press and Beyond
World Wide Web

Louel Bornie S. Baguio


Information Society
Information Society is a term for a society in which
the creation, distribution, and manipulation of
information has become the most significant
economic and cultural activity. An Information
Society may be contrasted with societies in which
the economic underpinning is primarily Industrial
or Agrarian. The machine tools of the Information
Society are computers and telecommunications,
rather than lathes or ploughs.

Louel Bornie S. Baguio


5 definitions of an information society
Each of which presents criteria for identifying
the new.
1. Technological
2. Economic
3. Occupational
4. Spatial
5. Cultural

Louel Bornie S. Baguio


What is Information?
Semanticism: information is meaningful; it has a subject; it is
intelligence or instruction about something or someone.

Shannon and Weaver’s information theory: Information is a


quantity that is measured in "bits" and defined in terms of
the probabilities of occurrence of symbols. It is a definition
derived from and useful to the communications engineer
whose interest is with the storage and transmission of
symbols, the minimum index of which is on/off (yes/no or
0/1).

Louel Bornie S. Baguio


Information is a set of data which is processed in a
meaningful way according to the given requirement.
Information is processed, structured, or presented in a given
context to make it meaningful and useful.
It is processed data which includes data that possess context,
relevance, and purpose. It also involves manipulation of raw
data.
Information assigns meaning and improves the reliability of
the data. It helps to ensure undesirability and reduces
uncertainty. So, when the data is transformed into
information, it never has any useless details.

Louel Bornie S. Baguio


What is a DATA?
Data is a raw and unorganized fact that required to
be processed to make it meaningful. Data can be
simple at the same time unorganized unless it is
organized. Generally, data comprises facts,
observations, perceptions numbers, characters,
symbols, image, etc.

Data is always interpreted, by a human or machine,


to derive meaning. So, data is meaningless. Data
contains numbers, statements, and characters in a
raw form.
Louel Bornie S. Baguio
What is Technology?
Semanticism: “the application of scientific
knowledge for practical purposes,
especially in industry.”

Louel Bornie S. Baguio


Louel Bornie S. Baguio
DIKW (Data Information Knowledge Wisdom)

Louel Bornie S. Baguio


Louel Bornie S. Baguio
The Role of Language
Language is a vital part of human connection.
Although all species have their ways of
communicating, humans are the only ones that
have mastered cognitive language
communication. Language allows us to share
our ideas, thoughts, and feelings with others.
It has the power to build societies, but also
tear them down.

Louel Bornie S. Baguio


Louel Bornie S. Baguio
The Basic Functions Of Language
1. Informative Function : to inform others by being
able to state facts clearly.

2. Expressive Function : used to express oneself by


giving us ways to convey our feelings, emotions,
and attitudes to another person (or ourselves).

3. Directive Function : helps us to direct or command.

Louel Bornie S. Baguio


Different Types Of Language
Oral Vs. Written Language
Oral communication - is spoken language meant for conversing
with others.
Written language - is about expressing ideas through writing
words down.

Denotative Meaning Vs. Connotative Meaning


Denotative meaning - is the literal definition/intention of the
word
Connotative meaning - is when words carry positive or negative
meanings/connotations.
Louel Bornie S. Baguio
Six elements of language:
Clarity: ensures the intended audience fully understands your ideas; that your
ideas are clear.
Economy: avoiding any unnecessary language and using only the necessary and
appropriate words to express yourself; avoiding fluff or complicated
vocabulary.
Obscenity: ‘indecent language’, including, but not limited to, curse words and
hateful remarks.
Obscure Language/Jargon: This is very specific language limited to a few
people
Power: uses language to exert power over someone to manipulate them,
command them, or to get them to do something they want. It could also be to
demonstrate yourself as an authority in the room.
Variety: This is a speaker’s ability to use a combination of all the different types
of language aforementioned to successfully and creatively get ideas across.
Louel Bornie S. Baguio
Louel Bornie S. Baguio
Mathematics as the Language of Nature
Three centuries earlier, Galileo had written, "Nature's
great book is written in mathematical language" an
opinion that has wholeheartedly been endorsed by
physicists of our own time.
Mathematics does not have a clearly defined,
universally accepted definition. However, it is safe to
say that anything that studies the interaction
between quantities, variables, structure, and
change, is mathematics.

Louel Bornie S. Baguio


Louel Bornie S. Baguio
Louel Bornie S. Baguio
Mathematics as the Language of Nature
Mathematics is not a tangible thing, but actually an abstract concept.
There are a great many ways of expressing mathematics; the one
you are probably most familiar with is the base ten Arabic format
that permeates science right now.
The base, the symbols, the structure, and the methods used to
express mathematics can all be radically different and yet, it is still
mathematics.
Mathematics is the expression and quantification of basic logical
concepts, and then it builds on those logical concepts to form
increasingly complex concepts. It is, however, entirely a logical
progression.

Louel Bornie S. Baguio


The Münchhausen Trilemma
It is a particularly annoying realization in the study of the logical
justification for anything and everything. Münchhausen reasoned
that the proof behind anything was either:
1. A CIRCULAR ARGUMENT (A IS BECAUSE OF B WHICH IS
BECAUSE OF C WHICH IS BECAUSE OF A)
2. AN INFINITE REGRESSION (1 IS BECAUSE OF 2 WHICH IS
BECAUSE OF 3…)
3. AN AXIOMATIC ARGUMENT (A IS BECAUSE OF B WHICH IS
BECAUSE OF C, AND WE ASSUME THAT C REQUIRES NO
PROOF)

Louel Bornie S. Baguio


The Fibonacci Sequence:
Named for the famous mathematician, Leonardo Fibonacci,
this number sequence is a simple, yet profound pattern.

Based on Fibonacci’s ‘rabbit problem,’ this sequence begins


with the numbers 1 and 1, and then each subsequent
number is found by adding the two previous numbers.
Therefore, after 1 and 1, the next number is 2 (1+1). The
next number is 3 (1+2) and then 5 (2+3) and so on.

What’s remarkable is that the numbers in the sequence are


often seen in nature.

Louel Bornie S. Baguio


Louel Bornie S. Baguio
Fractals in Nature:
Fractals are another intriguing
mathematical shape that we seen
in nature. A fractal is a self-
similar, repeating shape, meaning
the same basic shape is seen again
and again in the shape itself.

In other words, if you were to zoom


way in or zoom way out, the same
shape is seen throughout.

Louel Bornie S. Baguio


Hexagons in Nature:
Another of nature’s geometric
wonders is the hexagon. A
regular hexagon has 6 sides of
equal length, and this shape is
seen again and again in the
world around us.
The most common example of
nature using hexagons is in a
bee hive. (snowflakes, bubbles)

Louel Bornie S. Baguio


Concentric Circles in Nature:
Another common shape in nature is a
set of concentric circles. Concentric
means the circles all share the same
center, but have different radii. This
means the circles are all different
sizes, one inside the other.
A common example is in the ripples of a
pond when something hits the surface
of the water. But we also see
concentric circles in the layers of an
onion and the rings of trees that form
as it grows and ages.
Louel Bornie S. Baguio
Math in Outer Space:
The shape of our galaxy is a Fibonacci spiral. The planets orbit the sun
on paths that are concentric. We also see concentric circles in the
rings of Saturn.
But we also see a unique symmetry in outer space that is unique (as far
as scientists can tell) and that is the symmetry between the earth,
moon and sun that makes a solar eclipse possible.
Every two years, the moon passes between the sun and the earth in
such a way that it appears to completely cover the sun. But how is
this possible when the moon is so much smaller than the sun?
Because of math.
You see, the moon is approximately 400 times smaller than the sun,
but it is also approximately 400 times further away.
This symmetry allows for a total solar eclipse that doesn’t seem to
happen on any other planet.
Louel Bornie S. Baguio
Louel Bornie S. Baguio
Technological World
Technology is neither a means to an end nor a human activity.
Technology, according to Heidegger must be understood as “a
way of revealing” (Heidegger 1977, 12). It is his translation
of the Greek word alètheuein, which means ‘to discover’ – to
uncover what was covered over. Related to this verb is the
independent noun alètheia, which is usually translated as
“truth,” though Heidegger insists that a more adequate
translation would be “un-concealment.”

Louel Bornie S. Baguio


The Past and The Future
TECHNOLOGY OF THE PAST TECHNOLOGY OF THE PRESENT
• Atari 2600, NES • PlayStation, XBOX
• Commodore 64, Apple I, II, • PCs, laptops, Macbook, iMac
Lisa • Smartphones
• Motorola • MP3,MP4, iPods, CD Player
• Walkman, Record Player • DVD Player, Blu-ray
• VCR • Flat Screen TV
• TV

Louel Bornie S. Baguio


SPACEWAR to PUBG

Louel Bornie S. Baguio


Mobile Phones
• 1984 - The first mobile phone is released
to the public by Motorola and it cost
$3,995
• 1989- The prices keep going down,
mobile phones become faster and sleek
• 1992- SMS is created
• 1993- The first mobile phone with
smartphone capabilities is launched.
• 2002- Mobile Phones with cameras and
colored screen start appearing in the
market
• 2007- Apple releases the first iPhone
Louel Bornie S. Baguio
Evolution of Computers

Louel Bornie S. Baguio


Teenagers and technology
How technology affects teenagers
• Cellphones- Many teens have cell phones, they became dependent
on them to stay connected with friends and with the outside world.
Keeping in touch with friends and parents is important but should
not occupy the majority of a teen’s time. The teenagers get’s
addicted on it.
• Computers- Teenagers need computers for school, but sometimes
they get distracted of the main task and start to surf on the web,
playing video games….Teens spend hours on computers. Teens
who abuse the internet can have a decrease in school and
relationship performance.

Louel Bornie S. Baguio


How technology affects teenagers- Conclusion
• Video games- They can help teens unwind and release
stress as long as gaming isn't excessive. Excessive gaming
can lead to attention issues at school and poor academic
performance.

• Television- Many teens prefer to watch television or play


on the computer to going outside for physical recreation
activities. This can lead to obesity and a sedentary
lifestyle. Too much media at home makes it too easy for
teens to default to inactivity.

Louel Bornie S. Baguio


Technology in Education
Advantages
• Quick access to information- While some years ago, when
we needed to search or do a school work we would go to
places like libraries nowadays we don’t even have to get
out of our homes, Internet gives us access to everything.
• Help protecting the environment- Due to technology, book
printing will reduce and more digital books will appear.
• Making education enjoyable- Nowadays it’s hard to engage
students attention, however with technology teachers can
make classes more interactive and more interesting to
them.
Louel Bornie S. Baguio
Technology in Education
Disadvantages
• Technical Problems- When there is a problem with
the computer or the projector in the classroom
teachers will waste class time solving it and will not
be able to finish the planned lesson.
• Attention Problems- When students don’t find the
material their teacher brought interesting they just
shutdown and misbehave, not paying attention to
the class and disturbing they schoolmates.
Louel Bornie S. Baguio
The Future of Human Technology
Louel Bornie S. Baguio
The Future of Humanity

• People may be replaced by


machines as technology is
developing new automatized,
processes of production
• Technology will make people’s
life easier.
• Technology like social
networks will end face to face
relationships.

Louel Bornie S. Baguio


The Printing Press and Beyond
Life before the printing press:
Before the printing press was invented,
any writings and drawings had to be
completed painstakingly by hand.
Several different materials were used
to transcribe books: clay and
papyrus, wax, and parchment. It
wasn’t just anyone who was allowed
to do this; such work was usually
reserved for scribes who lived and
worked in monasteries.
Louel Bornie S. Baguio
Scriptorium
The monasteries had a special room called a
"scriptorium." There, the scribe would work in
silence, first measuring and outlining the page
layouts and then carefully copying the text from
another book. Later, the illuminator would take
over to add designs and embellishments to the
pages.

In the Dark Ages and Middle Ages, books were usually only owned by
monasteries, educational institutions or extremely rich people. Most
books were religious in nature. In some cases, a family might be
lucky enough to own a book, in which case it would be a copy of the
Bible.
Louel Bornie S. Baguio
Louel Bornie S. Baguio
Impact of the printing press
Gutenberg’s invention made a dramatic impact when it
reached the public. At first, the noble classes looked down on
it. To them, hand-inked books were a sign of luxury and
grandeur, and it was no match for the cheaper, mass-
produced books.
Thus, press-printed materials were at first more popular with
the lower classes. When word spread about the printing
press, other print shops opened and soon it developed into
an entirely new trade. Printed texts became a new way to
spread information to vast audiences quickly and cheaply.
Academics benefited from this dissemination of scholarly
ideas and even politicians found that they could garner the
public’s interest through printed pamphlets.
Louel Bornie S. Baguio
Impact of the printing press
An important side effect was that people could read and
increase their knowledge more easily now, whereas in the
past it was common for people to be quite uneducated. This
increased the discussion and development of new ideas.
Another significant effect was that the printing press was
largely responsible for Latin’s decline as other regional
languages became the norm in locally printed materials. The
printing press also helped standardize language, grammar,
and spelling.
The printing press played a major role in shaping the
Renaissance, which has interesting correlations to today’s
Information Age.

Louel Bornie S. Baguio


Modern print technology has made printing more
affordable and accessible than ever, whether you’re
printing thousands of booklets or a single short run
poster. The industry has even embraced the Digital
Age, which has given rise to online printing
companies that make it easy for anyone to design,
print, and mail printed materials without leaving
their computers.

Louel Bornie S. Baguio


Louel Bornie S. Baguio
World Wide Web
The World Wide Web is a network of online content
that is formatted in HTML and accessed via HTTP.
The term refers to all the interlinked HTML pages
that can be accessed over the internet. It is
technically all the web pages, videos, pictures and
other online content that can be accessed via a web
browser. The world wide web, or WWW, was first
created as a method to navigate the now extensive
system of connected computers. It was designed by
Tim Berners-Lee through a rudimentary hypertext
program called Enquire.
Louel Bornie S. Baguio
World Wide Web
The WWW was introduced and originated by a
contractor named Tim Berners-Lee who worked
with the European Organization for Nuclear
Research developed Enquire-a rudimentary
hypertext program. This program was designed in a
way in order to make information readily available to
users. It also focused on allowing a user to explore
relationships between different pages by clicking to
get to a different section of a website.

Louel Bornie S. Baguio


Louel Bornie S. Baguio
Louel Bornie S. Baguio
A quick overview
Web 1.0 as a web of cognition

Web 2.0 as a web of communication

Web 3.0 as a web of co-operation

Web 4.0 as a web of integration

Louel Bornie S. Baguio


Louel Bornie S. Baguio
Louel Bornie S. Baguio
Web 1.0
Web 1.0 is the first generation of the web which could
be considered the read-only web and also as a
system of cognition.
Web 1.0 began as an information place for businesses
to broadcast their information to people.
The early web provided a limited user interactions or
content contributions and only allowed to search the
information and read it.

Louel Bornie S. Baguio


Web 2.0
Web 2.0 was defined as a read-write web.
The technologies of web 2.0 allow
assembling and managing large global
crowds with common interests in social
interactions.

Louel Bornie S. Baguio


Web 3.0
Web 3.0 or semantic web desires to decrease
human's tasks and decisions and leave them to
machines by providing machine-readable contents
on the web.
Web 3.0 included two main platforms, semantic
technologies and social computing environment.

Louel Bornie S. Baguio


Web 4.0
Web 4.0 will be as a read-write-execution-
concurrency web with intelligent interactions,
but there is still no exact definiton of it.
Web 4.0 is also known as symbiotic web.

Louel Bornie S. Baguio


Louel Bornie S. Baguio
Thank you!

Louel Bornie S. Baguio


By: Louel Bornie Baguio RN, MAN
Week 2: Data Privacy

1. Data Privacy Act


2. Copyright Infringement
3. Confidentiality
4. Proper Citation
The Philippines’s population

•The Philippines had a population of 110.3 million in January


2021.
•The Philippines’s population increased by 1.5 million (+1.3%)
between January 2020 and January 2021.
•49.8% of the Philippines’s population is female, while 50.2% of
its population is male [note: the United Nations does not
publish data for genders other than ‘female’ and ‘male’].
•47.6% of the Philippines’s population lives in urban centres,
while 52.4% lives in rural areas.
Internet users in the Philippines
1. There were 73.91 million internet users in the
Philippines in January 2021.
2. The number of internet users in the Philippines
increased by 4.2 million (+6.1%) between 2020
and 2021.
3. Internet penetration in the Philippines stood at
67.0% in January 2021.
Social media statistics for the Philippines

• There were 89.00 million social media users in the


Philippines in January 2021.
• The number of social media users in the
Philippines increased by 16 million (+22%)
between 2020 and 2021.
• The number of social media users in the
Philippines was equivalent to 80.7% of the total
population in January 2021.
Mobile connections in the Philippines
•There were 152.4 million mobile connections in
the Philippines in January 2021.
•The number of mobile connections in the
Philippines decreased by 15 million (-8.9%)
between January 2020 and January 2021.
•The number of mobile connections in the
Philippines in January 2021 was equivalent
to 138.2% of the total population.
Republic Act No. 10173 or the Data Privacy Act of 2012 (DPA)

“to protect the fundamental human right to


privacy of communication while ensuring free
flow of information to promote innovation and
growth [and] the [State’s] inherent obligation to
ensure that personal information in information
and communications systems in government and
in the private sector are secured and protected”.
REPUBLIC ACT 10173 DATA PRIVACY ACT OF 2012 (DPA)

It is the policy of the State to protect the fundamental


human right of privacy, of communication while ensuring
free flow of information to promote innovation and
growth. The State recognizes the vital role of information
and communications technology in nation-building and
its inherent obligation to ensure that personal information
in information and communications systems in the
government and in the private sector are secured and
protected.
Definition of Terms
DATA PROCESSING – any operation or any set of operations
performed upon personal information including, but not limited to,
the collection, recording, organization, storage, updating or
modification, retrieval, consultation, use, consolidation, blocking,
erasure or destruction of data

PERSONAL INFORMATION - any information whether recorded in a


material form or not, from which the identity of an individual is
apparent or can be reasonably and directly ascertained by the entity
holding the information, or when put together with other
information would directly and certainly identify an individual.
Definition of Terms
• INFORMATION AND COMMUNICATIONS SYSTEMS - a
system for generating, sending, receiving, storing or
otherwise processing electronic data messages or
electronic documents and includes the computer system or
other similar device by or which data is recorded,
transmitted or stored and any procedure related to the
recording, transmission or storage of electronic data,
electronic message, or electronic document.
• DATA SUBJECT – an individual whose personal
information is processed
REPUBLIC ACT 10173 DATA PRIVACY ACT OF 2012 (DPA)

Scope:
This Act applies to the processing of all types of personal
information and to any natural and juridical person
involved in personal information processing including those
personal information controllers and processors who,
although not found or established in the Philippines, use
equipment that are located in the Philippines, or those who
maintain an office, branch or agency in the Philippines
subject to the immediately succeeding paragraph: Provided,
That the requirements of Section 5 are complied with.
Exclusions:
REPUBLIC ACT 10173 DATA PRIVACY ACT OF 2012 (DPA)

The DPA and its Implementing Rules and Regulations (IRR) apply to all acts
done or practices engaged in and outside of the Philippines if:
•If the person, either an individual or an institution, involved in the
processing of personal data is located in the Philippines;
•The act or practice involves personal data of a Philippine citizen or
Philippine resident;
•The processing of personal data is done in the Philippines; or
•The act, practice or processing of personal data is done by an entity
with links to the Philippines, subject to international law and comity.
“Personal data” refers to all types of personal information.
The National Privacy Commission (NPC)
is in charge of administering and implementing the DPA. It is also tasked to
monitor and ensure compliance of the Philippines with international standar
ds for personal data protection.
The major functions of the NPC are as follows:
1. Rule making
2. Advisory
3. Public education
4. Compliance and monitoring
5. Complaints and investigations
6. Enforcement
General Rights of Data Subjects
1. Right to INFORMATION;
2. Right to ACCESS;
3. Right to CORRECT;
4. Right to REMOVE;
5. Right to DAMAGES;
6. Right to DATA PORTABILITY.
Copyright Infringement
Copyright infringement
✓ is the use or production of copyright-protected material without
the permission of the copyright holder.
✓ Copyright infringement means that the rights afforded to the
copyright holder, such as the exclusive use of a work for a set
period of time, are being breached by a third party.
✓ The most well-known forms of entertainment that suffer from
significant amounts of copyright infringement:
a. Music
b. Movies
✓ Infringement cases may lead to contingent liabilities, which are
amounts set aside in case of a possible lawsuit.
Copyright infringement
There are three elements that must be in place in
order for the infringement to occur.
•The copyright holder must have a valid copyright.
•The person who is allegedly infringing must have
access to the copyrighted work.
•The duplication of the copyrighted work must be
outside the exceptions.
Copyright Infringement Issues

1.Technology
2.International Issues
3.Photography and Visual Assets
4.Noneconomic Rights
5.The Internet
Data confidentiality
Data confidentiality is about protecting data against
unintentional, unlawful, or unauthorized access, disclosure, or
theft.
Confidentiality has to do with the privacy of information,
including authorizations to view, share, and use it. Information
with low confidentiality concerns may be considered "public"
or otherwise not threatening if exposed beyond its intended
audience. Information with high confidentiality concerns is
considered secret and must be kept confidential to prevent
identity theft, compromise of accounts and systems, legal or
reputational damage, and other severe consequences.
Data confidentiality
Examples of data with high confidentiality concerns
include:

✓Social Security numbers, which must remain


confidential to prevent identity theft.
✓passwords, which must remain confidential to
protect systems and accounts.
Data confidentiality
Consider the following when managing data confidentiality:

✓ To whom data can be disclosed


✓ Whether laws, regulations, or contracts require data to remain
confidential
✓ Whether data may only be used or released under certain
conditions
✓ Whether data is sensitive by nature and would have a negative
impact if disclosed
✓ Whether data would be valuable to those who aren't permitted to
have it (e.g., hackers)
Guidelines for data confidentiality
When managing data confidentiality, follow these guidelines:

Encrypt sensitive files.


Encryption is a process that renders data unreadable to anyone except those who have the
appropriate password or key.

Manage data access.


Controlling confidentiality is, in large part, about controlling who has access to data.
Ensuring that access is only authorized and granted to those who have a "need to know"
goes a long way in limiting unnecessary exposure. Users should also authenticate their
access with strong passwords and, where practical, two-factor authentication. Periodically
review access lists and promptly revoke access when it is no longer necessary.
Guidelines for data confidentiality
• Physically secure devices and paper documents.
Controlling access to data includes controlling access of all kinds, both
digital and physical. Protect devices and paper documents from misuse or
theft by storing them in locked areas. Never leave devices or sensitive
documents unattented in public locations.
• Securely dispose of data, devices, and paper records.
When data is no longer necessary for University-related purposes, it must be
disposed of appropriately.
– Sensitive data, such as Social Security numbers, must be securely erased to ensure
that it cannot be recovered and misused.
– Devices that were used for University-related purposes or that were otherwise used
to store sensitive information should be destroyed or securely erased to ensure that
their previous contents cannot be recovered and misused.
– Paper documents containing sensitive information should be shredded rather than
dumped into trash or recycling bins.
Guidelines for data confidentiality
When managing data confidentiality, follow these guidelines:
•Manage data acquisition.
When collecting sensitive data, be conscious of how much data is actually needed and carefully
consider privacy and confidentiality in the acquisition process. Avoid acquiring sensitive data unless
absolutely necessary; one of the best ways to reduce confidentiality risk is to reduce the amount of
sensitive data being collected in the first place.
•Manage data utilization.
Confidentiality risk can be further reduced by using sensitive data only as approved and as necessary.
Misusing sensitive data violates the privacy and confidentiality of that data and of the individuals or
groups the data represents.
•Manage devices.
Computer management is a broad topic that includes many essential security practices. By
protecting devices, you can also protect the data they contain. Follow basic cybersecurity hygiene by
using anti-virus software, routinely patching software, whitelisting applications, using
device passcodes, suspending inactive sessions, enabling firewalls, and using whole-disk
encryption.
Guidelines for data confidentiality
You are a target. Information security is everyone's responsibility.

https://www1.udel.edu/security/data/confidentiality.html
Proper Citation and Attribution
Avoiding Plagiarism
What is PLAGIARISM?
◼ Use of another person's work without
acknowledgment with the intent to pass it
off as your own
What is PLAGIARISM?
◼ Use of another person's work without
acknowledgment with the intent to pass it off as
your own
◼ Buying, stealing, borrowing, or otherwise
obtaining all or part of a paper; hiring someone
to write a paper
What is PLAGIARISM?
◼ Use of another person's work without
acknowledgment with the intent to pass it off as
your own
◼ Buying, stealing, borrowing, or otherwise
obtaining all or part of a paper; hiring someone
to write a paper
◼ Submitting the same paper for more than one
class
It is a serious offense
It’s easier to track than you think.
◼ Instructors reading your work have a very sound
knowledge of the field of interest you are writing
about, and can recognize the use of other’s work.
◼ It is easier than ever to find the source of plagiarized
material.
When is plagiarism most likely to happen?
◼ When assignments or papers are left to the last
minute….plan ahead and stage your work to avoid last
minute writing….
◼ When students are stressed by multiple life or academic
pressures and try to take short cuts
◼ When students are not careful about their note-taking, or
instead of note-taking, copy and paste actual text into
their electronic notes folder or paper draft….NEVER DO
THIS!
Consequences of
Lack of or Inadequate Attribution
YSN - Policy #33
Disciplinary Procedures of the School of Nursing
◼ http://intranet.nursing.yale.edu/Intranet/Policies/default.aspx?id=33

❑ Hearing
❑ If proven to have plagiarized penalties include
◼ reprimand
◼ probation
◼ suspension
◼ expulsion
◼ In addition YSN may refer students for prosecution
Correct Attribution

Students must acknowledge the work


of others when they are creating their
own works.
How to Avoid Plagiarism
◼ proper and complete citation of

❑ original source of the work


❑ ideas
❑ words
❑ concepts
❑ data
❑ Images
This applies to paraphrasing or summarizing the
work of others as well as direct quotations.
If in doubt, always ask!
Source: Public Health Image Library
http://phil.cdc.gov/phil/home.asp
How to avoid – Research

◼ keep accurate information about sources

◼ never copy and paste text from another source unless


you quote it and cite it as a quote

◼ if your conclusions are same as someone else’s


acknowledge consensus
How to avoid – Helpful Tools

◼ Citation Management Tools


❑ EndNote ($)
❑ RefWorks (Free from the Library)
◼ http://www.med.yale.edu/library/education/guides/subcategory/citations
❑ Quosa
◼ Organizes and indexes all your articles and documents
◼ http://www.med.yale.edu/library/education/guides/quosa
How to avoid – Writing

◼ organize your work in an original way


◼ give exact attribution
❑ use quotation marks and include page number when necessary
◼ citations should allow reader to find material quoted

*see APA Manual 6th Edition pp. 171-172


How to avoid – Editing

Ask yourself
◼ is the language my own, even paraphrasing?

◼ is this my original idea?

If not, acknowledge source or rewrite to reflect


your thoughts and wording
How to Cite

“”
When in doubt
CITE!
Citation Resources in detail!

APA Manual 6th Edition!


❑ Required for courses and writing
assignments
❑ Medical Library Info Room

◼ REF20 BF76.7 P83 2010


◼ List price $28.95 ($16 on Amazon)
Citation Resources in detail!

◼ Dedicated links
❑ Nursing Librarian’s APA site
http://www.med.yale.edu/library/nursing/research/apa.html
❑ APA Style.org
Style help http://www.apastyle.org/apa-style-help.aspx
Tutorials http://www.apastyle.org/learn/tutorials/index.aspx#false
❑ General Counsel Office - Copyright
http://ogc.yale.edu/legal_reference/copyright.html
❑ Copyright Law and Fair Use
http://www.copyright.gov/
Not APA Style??

If writing for a journal that requires a different style (other than


APA)
❑ principles are the same
❑ consult the specific guidelines for authors concerning the actual
citation format
◼ Check the Journal’s/Publisher’s site
◼ Manuscript submission
◼ Instructions to Authors
Images

There are databases should you need images:


◼ Image Resources

http://guides.med.yale.edu/images

◼ Before using any images please check


copyright statements for each site
◼ Always cite images found on the Internet
Academic Integrity Module
MANDATORY
Complete the YSN Academic Integrity Module
◼ reviews the basic principles of academic
integrity
◼ required for all students as part
of the registration process….
Consequences of Lack of Attribution or Inadequate
Attribution -- #1
◼ YSN
❑ Policy #32 Personal Conduct Policy is signed by
all students at entry into YSN

❑ Policy #33 Disciplinary Procedures of the School


of Nursing

❑ In most cases, when lack of attribution is documented by the


faculty, failure of the assignment occurs, followed by the
procedure as outlined in Policy #33
Consequences of Lack of Attribution or Inadequate
Attribution -- #2
◼ Within the University
❑ Graduate School refers all allegations to the
Graduate School Committee on Regulations and
Discipline. May result in dismissal from the
University.
http://www.yale.edu/graduateschool/academics/ethics.html
❑ Academic Fraud at Yale University
http://www.yale.edu/grants/policies/academic-fraud.html
Consequences of Lack of Attribution or Inadequate
Attribution -- #3
◼ In the larger academic and clinical
community
❑ Professional careers are ended or severely
damaged- Stephen Ambrose, Doris Kearns
Goodwin…others
Resources and References
◼ American Psychological Association. (2009). Publication manual of the
American Psychological Association (6th ed.). Washington, DC: American
Psychological Association.

◼ American Psychological Association. (2007). APA style guide to electronic


references. Washington, DC: American Psychological Association.

◼ Yale College Writing Center --


(http://www.yale.edu/bass/writing/sources/plagiarism/what.html)

◼ Yale College and the Graduate School of Arts and Sciences


(http://www.yale.edu/graduateschool/academics/integrity.html)

◼ YSN Personal Conduct Policy


❑ Policy #32
http://intranet.nursing.yale.edu/Intranet/Policies/default.aspx?id=32
❑ Policy # 33
http://intranet.nursing.yale.edu/Intranet/Policies/default.aspx?id=33
III. Biodiversity
By: Louel Bornie S. Baguio RN, MAN
III. Biodiversity
• A. Biotechnology
• B. Genetically Modified
Organisms
• C. Genetic Modification
Objectives:

1. determine the interrelatedness of


society, the environment, and health;
2. explain the process of genetic
engineering; and
3. discuss the ethics, implications, and
potential future impacts of genetically-
modified organisms.
What is Biodiversity?
• Biodiversity is the shortened form
of two words "biological" and
"diversity". It refers to all the
variety of life that can be found on
Earth (plants, animals, fungi and
micro-organisms) as well as to the
communities that they form and the
habitats in which they live.
What is Biodiversity?
• Coined by biologists in the
1980s as a contraction of
biological diversity, the
term usually refers to the
variety of life on Earth as a
whole.
Biodiversity is species, genetic and ecosystem diversity

Biodiversity is not only the sum of all ecosystems, species and


genetic material. Rather, it represents the variability within and
among them. Biological diversity is often understood at three
levels:
• Species diversity - refers to the variety of different species;
• Genetic diversity - corresponds to the variety of genes contained in
plants, animals, fungi and micro-organisms;
• Ecosystem diversity - refers to all the different habitats that exist,
like tropical or temperate forests, hot and cold deserts, wetlands,
rivers, mountains, coral reefs, etc.
The loss of biodiversity has increased in the 20th century

• Identified anthropogenic drivers influencing the loss of


biodiversity are:
– land conversion,
– exploitation, Although climate is a slow changing
– fragmentation, factor, studies on the impacts of
climate change concluded that
– water extraction,
climate change is already affecting
– pollution, species distributions all over the
– eutrophication world and will impact nature to a
considerable amount in the 21st
– climate change. century.
The importance of biodiversity
What is Biotechnology?

• Biotechnology is technology that utilizes


biological systems, living organisms or parts
of this to develop or create different products.
• Brewing and baking bread are examples of processes
that fall within the concept of biotechnology (use of yeast
(= living organism) to produce the desired product). Such
traditional processes usually utilize the living organisms in
their natural form (or further developed by breeding),
while the more modern form of biotechnology will
generally involve a more advanced modification of the
biological system or organism.
Brief History
• The first form of biotechnology would apparently be the
ancient agricultural practices for food production.
– For instance, farmers and plant breeders selected specific breeds of plant
crops. As a result, the genes of these crops have changed through time and
bring about new features that breeders regarded as “beneficial”, e.g. if such
agricultural practice or technique led to better crop yield. Selective breeding
has also been applied to improve livestock.
– Other older forms of biotechnology include cheese making, bread making,
and wine and beer brewing. At present, modern biological techniques have
expanded to other fields, e.g. developing products for use in medicine,
pharmacology, and many other industries.
Why is biotechnology important?
• Biotechnology is particularly important in the
field of medicine, where it facilitates the
production of therapeutic proteins and other
drugs. Synthetic insulin and synthetic growth
hormone and diagnostic tests to detect
various diseases are just some examples of
how biotechnology is impacting medicine.
Biotechnology has also proved helpful in
refining industrial processes, in
environmental cleanup, and in agricultural
production.
Branches
• Biotechnology has branched into different fields.
Some of them are as follows:
• Gold biotechnology – a biotechnology field
that makes use of bioinformatics or
computational techniques for data analyses and
formulating biological solutions. It also
includes nanotechnology.
• Blue biotechnology – a biotechnology field
that focuses on the use of sea resources for
manufacturing products.
Branches
• Green biotechnology – this field is concerned primarily
with the application of biotechnology in agriculture.
Examples: micropropagation, designing transgenic
plants, and genetic engineering of plants to
express beneficial traits (e.g. pest resistance).
• Yellow biotechnology – the field of biotechnology that
involves insects.
• White biotechnology – also referred to as industrial
biotechnology, is for the application of biological systems
or living organisms in industrial processes. Examples
include microorganisms genetically-engineered to produce certain
chemicals and the use of enzymes as industrial catalysts.
Branches
• Red biotechnology – the field that applies
biotechnology in medicine and pharmacology.
Examples: designing and manufacturing vaccines and
antibiotics, producing artificial organs, development of
hormones and stem cells.
• Gray biotechnology – the application of
biotechnology in the environment and in
maintaining biodiversity. It is also used in the
removal of pollutants.
• Violet biotechnology – concerned with the
ethical and legal aspects of biotechnology.
What is GMO?
• GMO stands for Genetically Modified Organism. Let’s
break it down word by word.
– Genetically refers to genes. Genes are made up of DNA,
which is a set of instructions for how cells grow and
develop.
– Modified - implies that some change or tweak has been
made.
– Organism - refers to all living things, including bacteria
and fungi.
Genetically Modified Organism
What is a genetically modified organism?

• A genetically modified organism


(GMO) is an organism whose DNA
has been modified in the laboratory
in order to favour the expression of
desired physiological traits or the
production of desired biological
products.
Why are genetically modified organisms important?

• Genetically modified organisms (GMOs)


provide certain advantages to
producers and consumers. Modified
plants, for example, can at least initially
help protect crops by providing
resistance to a specific disease or
insect, ensuring greater food
production. GMOs are also important
sources of medicine.
Sample application of GMO’s
Genetic Modification
• Genetic modification is a technique to
change the characteristics of a plant,
animal or micro-organism by transferring a
piece of DNA from one organism to a
different organism. This is done through
targeted removal of the
desired genes from the DNA of one
organism and adding them to the other
organism.
Genetic Modification
• Genetic modification is the process of
altering the genetic makeup of an
organism. This has been done indirectly for
thousands of years by controlled, or
selective, breeding of plants and animals.
Modern biotechnology has made it easier
and faster to target a specific gene for
more-precise alteration of the organism
through genetic engineering.
Genetic Modification
• The terms "modified" and "engineered" are often
used interchangeably in the context of labeling
genetically modified, or "GMO," foods. In the field
of biotechnology, GMO stands for genetically
modified organism, while in the food industry, the
term refers exclusively to food that has been
purposefully engineered and not selectively bred
organisms. This discrepancy leads to confusion
among consumers, and so the U.S. Food and
Drug Administration (FDA) prefers the term
genetically engineered (GE) for food.
Genetic Modification
A brief history of genetic modification
• Genetic modification dates back to ancient
times, when humans influenced genetics
by selectively breeding organisms,
according to an article by Gabriel Rangel, a
public health scientist at Harvard
University. When repeated over several
generations, this process leads to dramatic
changes in the species.
The moral dilemma
• The technology may be available, but should scientists
pursue genetic modification studies in humans? It
depends, said Rivka Weinberg, a professor of philosophy
at Scripps College.
• "When it comes to something like a [new] technology, you
have to think about the intention and different uses of it,"
Weinberg said.
• The majority of medical trials for treatments that make
use of genetic engineering are performed on consenting
patients. However, genetic engineering on a fetus is
another story.
• "Experimentation on human subjects without their consent is
inherently problematic," Weinberg said. "There are not only
risks, [but also] the risks are not mapped out. We don't even
know what we are risking."
• If the next-generation technology were available and shown
to be safe, the objections to testing it in humans would be
minimal, Weinberg said. But that's not the case.
• "The big problem with all of these experimental technologies is that
they are experimental," Weinberg said. "One of the main reasons
why people were so horrified by the Chinese scientist who used
CRISPR technology on embryos is because it is such an early stage
of experimentation. It is not genetic engineering. You are just
experimenting on them."
• The vast majority of the proponents for genetic engineering realize
that the technology isn't ready to be tested on humans yet, and state
that the process will be used for good. The goal of genetic
modification, Jacob said, "has always been to tackle problems
currently facing human society."

You might also like