You are on page 1of 11

Abstract: while many matters have been changed

through the sciences and technical


A. INTRODUCTION
development, but education and the
Information technology is a students learning methods and the
technology for processing data such as data teachers.The international society for
processing, acquisition, compilation, technology in educational (ISTE)*
storage, and storage. Manipulate data in emphasizes that the teachers of today
different ways to obtain useful information should prepare to provide technology-based
Quality. relevant, accurate, and current learning opportunities for the students.In
information. Use different computers to fact, preparation for applying the
process data and network systems Connect technology and awareness of technology to
your computer to other computers enhance the quality of the students learning
according to disseminating data using should be one of the teacher's basic skills.
needs, and telecommunication technology,
B. Historical Information Technology
Accessed worldwide. In the communication
Development
process, two or more people who
communicate can send and receive Development occurs quite quickly
information. Telecommunications has been in the field of Information technology, this
around since the 18th century and is now change is driven by the discovery in the
growing very rapidly. In general, this field of technology, technological
technology can be distinguished into development we can understand from
several types such as telegraph, telephone, several angles of onong uchya efendy..
and television. Information technology was [77248] According to Alvin Toffler,
also seen in ancient times, but today, in the humans have now entered an era called the
form of cave drawings and symbols, third wave. This era is also called the era of
information technology is highly industrialization or the information age. In
developed. Internet and phone. Information general, there are several main sources of
technology has played a very important role the technological revolution, namely: The
in changing people's lives, and today, invention of the first printing press by
corporate and personal information Johanness Gutenberg in 1455, was the first
technology is used almost all over the technological revolution of man in terms of
world. the rapid dissemination of information to
many circles after the discovery of paper..
The Internet as one of the impacts of new
[77415]
technological developments basically can
not only be a door to know how the culture C. The Benefits of Information
that exists in society in a particular area, Technology
but rather be a device in the expression of
Advances in information science
culture itself. Because of the rapid
and technology have changed the way they
development of Information and
view and lifestyle of Indonesian people in
Communication Technology causes impact
carrying out their activities and
and influence on culture in society, either in
activities.The existence and role of
the form of positive impact and negative
information technology in the education
impact.
system has brought a new era of
development in the world of education, but Business activities are increasingly
these developments have not been balanced complex.
with the increase in human resources that
The ability of computers is
determine the success of the world of
increasing.Computer output in the form of
education in Indonesia in general. This is
information can be used by managers, non-
more because we still lag our human
managers or individuals in a company or
resources to utilize information technology
agency.Accurate, means that information
in the education process. The benefits of
must be free from errors and not It is
using technology are as a means of support
misleading for those who accept this
for students and educators to seek broader
onformation. Accurate also Information
information, in addition to using sources
should clearly reflect its intent. In practice,
from books and print media. This happens
it is possible in the delivery of a lot of noise
because the information on the Internet is
that can change or damage the content of
more updated so that students can easily
the information. Accurate components
access the new information needed, under
include:
the supervision of the teacher. The learning
process can be facilitated by the presence  Completeness, the amount of
of technology in education. Suppose the information generated or needed
teacher can provide learning materials or must have good information,
assignments via email so that learners can because if the information generated
immediately complete and complete the some will influence in decision
task. The use of technology in education making.
can make learners more comfortable and  Correctness, means that the
not seem saturated or monotonous. Because information generated or needed
the delivery of information through must have truth.
cangging technology looks more varied and  Security, considering the
modern. More complete information and information generated or needed
knowledge and easy access can make must have security.
students more interested in carrying out  a On time, the information received
learning. The use of technology in must be timely, because the
education does have several benefits for the information received must be
continuity of learning. However, on the timely. Outdated or late does not
other hand you should keep an eye on have good value, so when used as a
children when utilizing technology. basis in decision making will be
Because of the ease of easily accessible fatal. Currently the high value of
information in technology, not only information because it must be
positive information, but also negative quickly obtained information, so it
information. With the information cycle, takes cutting-edge technology to
data is still the raw material that must be get, process and send it.
processed to produce information through a  Relevant, information should have
model. The model used to process the data benefits for the recipient. Relevance
is called data processing or known as the of information for each person to
data processing cycle or information cycle. each other is different For example
Information needs are based on:
information about the cause of 1. The learning process becomes
damage to the production machine clearer and more interesting
to the company is less relevant and 2. The learning process becomes more
will be more relevant when interactive
addressed to the company's 3. Efficiency in time and effort
engineers. 4. Improving the quality of students'
 Economically, the information learning outcomes
generated has greater benefits 5. Media allows the learning process
to be done anywhere and anytime
compared to the cost of getting it and most
6. Media can foster students' positive
of the information is not
attitude towards the material and
can be precisely estimated profit with units learning process
of value for money but can be estimated 7. Change the role of teachers in a
value Its efficiency more positive and productive
direction.
Benefits of Learning Media
D. Influence of The Development of
Each learning material has a different level
Information Technology on The Field
of difficulty. Some materials don't require
of Management Accounting
learning media, while others need. Difficult
learning materials are certainly difficult to The Industrial Revolution 4.0 is a
understand, especially for students who do fusion of information technology and
not like the material presented. The industry. "From cybersecurity to
existence of learning media as a tool in the augmented reality to big data, being more
learning process is an undeniable fact. efficient and cheaper is part of the
Teachers as ambassadors have an interest in industry." Smart skills make energy
facilitating their obligation to convey consumption more efficient. This is a
messages to students and learning reasonable value from today's point of
materials. Teachers also realize that without view.
media, it will be difficult for students to
Energy to mitigate the impact of an
digest and understand learning materials,
energy crisis, especially in a world
especially if the learning materials they
exacerbated by exploitation, requires
need to provide are complex and complex.
energy efficiency to minimize it. Through
For this reason, the use of media is
the Internet of Things (IoT) and big data,
essential to ensure that the material reaches
technology can collect historical data and
students effectively and efficiently. In
predict what it will do in the future. This is
general, the use of media in the learning
commonly referred to as machine learning.
process is to facilitate interaction between
Not from the business side, the Industrial
teachers and students and make learning
Revolution 4.0 had a negative impact. One
activities more effective and efficient. But
of them concerns personal privacy. data
in particular, there are some more detailed
protection issues in the European Union.
media benefits. Kemp and Dayton
Eu data protection is protected by the
(Department of National Education, 2003)
General Data Protection Regulation
have identified several benefits of media in
(GDPR). This rule requires businesses to
learning:
get consumers' consent and tell them about information assets, information leaks and
how data is stored (including who they failures in the system can result in losses
share it with). These regulations are very both on the financial side and productivity
strict, especially for companies like Google of the company. [1556]
and Facebook. Then, as technology
In Information security according to
develops, so does the threat of crime that
Whitman and Mattod
uses the technology.
a) Physical Security focuses on
Complexity. The perpetrator does
strategies to secure physical assets
not have to be physically at the crime
such as physical assets of the
scene, but can damage the system through
government or organization,
an internet connection, affecting all the
employees and employees, and
machines and technologies on the network.
work locations from the threat of
2017 and 2018 Registered
disaster, natural disaster, or
Cyber/Cybercrime [1556ppt]
unauthorized access measures.
E. Information Technology Security b) Personal Security, related to
physical security in protecting
The importance of information gave
organizations and people in both
rise to the emergence of the term
government organizations and
information security. Today more and more
private.
sources of information come from the
c) Operation Security focuses on
internet so that information security
operational strategies to secure
concerns computer and network technology
government or private organizations
as well as information and communication.
to work without interruption.
The purpose of information security is to
d) Communication Security, securing
maintain business continuity and reduce the
communication media,
decline in business value by limiting the
communication technology, and
effects of security incidents. [3086]
utilizing communication technology
Information security is the protection of equipment to achieve organizational
information from various threats to ensure goals.
the continuation of business processes, e) Network Security, concerned with
reduce business risks, and increase return safeguarding the organization's data
of investment (ROI) and business sources, networks and their
opportunities (Chaeikar, etc., 2012). In contents, as well as the ability to use
designing information system security those networks and data for data
systems there are aspects of information communication within the
security that need to be considered. These organization[3086]
aspects, among others.
F. The Threat of Information Security
Confidentiality, Integrity, Availability. in the Era of the Industrial
According to (Whitman & Mattord, 2011) Revolution 4.0
information is one of the important assets
The Industrial Revolution 4.0 is a
to protect its security. Companies need to
fusion of information technology and
pay attention to the security of their
industry. "From cybersecurity to
augmented reality to big data, being more The organization must be able to minimize
efficient and cheaper is part of the the occurrence of risks. This risk is a threat
industry." Smart skills make energy to every company, especially assets.
consumption more efficient. This is a Company. In relation to information and
reasonable value from today's point of data, threats can be Some parts, including:
view.
 Loss of confidentiality of
Energy to mitigate the impact of an energy information
crisis, especially in a world exacerbated by  Loss of information integrity
exploitation, requires energy efficiency to  Loss of availability of information
minimize it. Through the Internet of Things  Loss of information
(IoT) and big data, technology can collect authentication[318]
historical data and predict what it will do in
the future. This is commonly referred to as H. Impact of Information Technology on
machine learning. Not from the business Human Life
side, the Industrial Revolution 4.0 had a          Utilization of information
negative impact. One of them is personal technology is the benefit expected by
privacy, data protection issues in the information system users in carrying out
European Union. Eu data protection is their duties where the measurement is
protected by the General Data Protection based on the intensity of utilization,
Regulation (GDPR). This rule requires frequency of use and the number of
businesses to get consumers' consent and applications or software used.
tell them about how data is stored
(including who they share it with). These Based on the theory proposed by Triandis
regulations are very strict, especially for (1980), the framework of research by
companies like Google and Facebook. Thompson et al (1991) and the results of
Then, as technology develops, so does the previous studies, there are six factors that
threat of crime that uses the technology. influence the use of information
technology, namely social factors, affect,
Complexity. The perpetrator does not have complexity, task suitability, long-term
to be physically at the crime scene, but can consequences and facilitating conditions.
damage the system through an internet
connection, affecting all the machines and Social factors are concerned with the
technologies on the network. 2017 and individual's internalization of subjective
2018 Registered Cyber/Cybercrime cultural group references and specific
[1556ppt] interpersonal agreements that individuals
have with others in particular social
G. Information Security Risk situations. Subjective culture contains
Management norms, roles and values. The affect factor is
Risk is something that will happen a feeling of joy, excitement, pleasure or
that is influenced by possible factors. a depression, disgust, displeasure and hatred
threat to some weakness or security hole associated with certain individuals in the
the impact of loss to the organization or use of information technology. Complexity
company. This risk It is something that is defined as the degree to which an
cannot be prevented, but every company or innovation is perceived as relatively
difficult to understand and use. Task and developing different processes of the
suitability relates to the extent to which the educational system more than one century ,
individual's ability to use information it is not surprising that new technology
technology to improve individual arrival has raised the interest in obtaining
performance in carrying out tasks. Long- knowledge by various methods of
term consequences are defined as future presenting knowledge. Today technology-
outcomes, such as increased flexibility, job based education is attainable at the
changes or increased opportunities for more universities of developed countries. By
meaningful work. Facilitating conditions evolving the learning environments at the
are defined as objective factors outside the beginning of the 21st century, individuals
environment that make it easier for the user and societies put heavy responsibility on
to act/work. [1] the shoulder of educational institutions and
their traditional structures by their
Impact on Culture
increasing need of education. Today
         Communication and Information various informational and communicational
Technology is the application of knowledge technologies have the ability of facilitating
and skills used by humans to transmit the education and learning process.[3]
information or messages with the aim of
         Changes in the environment outside
helping to solve human problems (social
the world of education, from the social,
activities) in order to achieve
economic, technological, to political
communication goals. The development of
environments require the world of
Information and Communication
education to rethink how these changes
Technology itself has had an impact and
affect it as a social institution and how to
influence on culture in society, both in the
interact with these changes. One of the
form of positive and negative impacts. One
environmental changes that greatly affect
aspect of life that is most affected by this
the world of education is the presence of
development is the cultural aspect of
information technology. Information that is
society which is gradually shifting. The
no longer organized into atoms – but in bits
product of communication and information
– has made the process of spreading faster
technology is the mass media which is
and easier. This media has also changed the
currently developing rapidly and
mindset of humans which is a response to
constantly, on the other hand, it inspires us
information packaging.
to see the media as the center of cultural
orientation for Western modern capitalism. An example of this change in mindset is the
Thus, cultural imperialism can be seen as birth of e-mail which has changed the way
the center of the media in various ways, of sending letters, e-business or e-
either by dominating cultural media (texts, commerce which has changed the way of
practices), or by spreading culture globally. doing business with all its derivatives,
[2] including e-cash or e-money. However, less
than 25% of senior high schools and 10%
Impact of Information Technology in
of vocational high schools are connected to
Education
the Internet. Analysis of the teaching grant
         By considering that education has proposal, only 29.69% used computer
been using the technology for expanding technology-based media. Only 15.54% of
state universities and 16.09% of private was much better than in rural areas. If only
universities have the availability of private schools are analyzed, this gap
information technology-based media. And becomes very high. Trainings to increase
only about 16.65% of students and 14.59% IT literacy are also another entry point that
of lecturers have access to information needs to be considered to increase
technology. The results of a survey that understanding of the potential of IT, which
looked at the use of IT in 2004 showed that in turn is expected to increase awareness.
only 17.01% of PTN, 15.44% of private Without awareness, IT utilization is not
universities, 9.65% of lecturers, and optimal, and what is even more worrying is
16.17% of students made good use of IT. difficult to sustain.
E-learning can be facilitated online or In this regard, programs for continuous
offline but it is assisted. Even some CD- awareness raising such as continuing
ROMs have facilitated students to learn education through various media and
according to the current curriculum with school website competitions are
attractive packaging. One company that alternatives that need to be considered.[4]
produces this kind of CD-ROM is Intellect.
Positive and Negative Effects of Social
To facilitate e-learning with the help of an
Media on Society
Internet connection, in recent years, many
applications have been developed that are As technology developed the web-
designed to support the learning process. based social network became the norm for
This LMS integrates many functions that every individual the last human of ; groups
support the learning process such as are considered to be dependent on this
facilitating various forms of instructional technology consistently. The online
materials, e-mail, chat, online discussions, network has extended quality and
forums, quizzes, and assignments. coordinated effort rates to students.
Business uses online networking to
Some problems also occur in the use of
improve the organizations operations in
information technology such as other
various courses for example to meet its
technologies that have come to this earth,
business goals yearly expanding its
IT also comes with dialectics. Especially
customer services. year of the organization.
the Internet, the spread of information that
The young people who meet every day are
is impossible to control has opened access
exposed to these mediums. Social media
to information that is not useful and
has different advantages ut they also have
destroys morals. The ethics that are
some flaws that affect individuals in
internalized in students' souls are the
reverse.
strongest firewalls in blocking the attacks
of useless information. This will widen the Wrong data can lead to disappointing
digital divide between students or schools training framework in the organization ad
with strong resource support and students advertising will affect’s productivity online
or schools with limited resources. network can harm the pulic by attacking
the safety of personally some useless
Yogyakarta, with 298 students from 6
wesites that can have an impact on young
different high schools, showed that access
people can end up on which is oviously
to computers and the Internet in urban areas
wild and may have some ad activities. past
but not least all citizens are encouraged to IT and Good Lifes
emrace the positive aspects of social
We argue that one purpose of IS research
media and avoid the negative effects so that
should be to explore, experiment, test,
we can reap the enefits from these latest
analyze, examine, explain, and reflect on
and emerging technologies.
how information technology can be in
Improving Safety With Information service of the good life. Such a purpose,
Technology even if vague, would strongly influence the
way research is carried out. An information
Medical care is, ofcourse, orders of
systems researcher is always in service to
magnitude more complex than selling
someone or something. So, to have truth as
personal computers, and clinicians have
the client has, over time, been
always strived to provide carefully
complemented with other potential clients,
individualized care.
leading to objectives such as organizational
The growing sophistication of computers and/or personal efficiency and
and software should allow information improvement, or detailed technological
technology to play a vital part in reducing solutions to more specific and narrow, real
that risk by streamlining care, catching and or imagined problems.
correcting errors, assisting with decisions,
So, while there is a strong general
and providing feedback on performance.
acceptance of information technology,
Given the large potential risks and benefits there is also a fear that it will force us into a
as well as the costs involved, in this article way of living that we cannot handle or do
we analyze what is known about the role not really want. This is a real challenge for
and effect of information technology with IS research. It is a challenge that demands a
respect to safety and consider the creative design of the very foundation for
implications for medical care, research, and information systems research. Such a
policy. design can be understood as a research
position.
Information technology can reduce the rate
of errors in three ways: by preventing In this paper we propose such a research
errors and adverse events, by facilitating a position based on a critical stance against
more rapid response after an adverse event reflective acceptance of information
has occurred, and by tracking and technology. We also propose, based on that
providing feedback about adverse events. position, the notion of the digital
transformation as a way of framing a
In today’s systems, many important
suitable object of study, and the idea of
warnings are ignored, and there are too
aesthetic experience as a base for a
many unimportant warnings. Approaches
methodological approach.
have been developed to highlight more
serious warnings for instance, by displaying Benefits of Information and
a skull and crossbones when a clinician Communication Technology during the
tries to order a drug that has previously Covid 19 Pandemic
caused an anaphylactic reaction in the
From the current review, it is
patient. [5]
evident that technology and social media-
based interventions can be an effective tool commerce has changed the economy
in promoting health and wellbeing among society and politics. This is the main reason
the sedentary population during the why todays companies that are competing
pandemic. Technology-based devices and more closely are moving towards a market
social media platforms can play a pivotal that meets the needs of buyers.
role in lifestyle interventions during the
Negative Impact of Information
COVID 19 era to dispense primary and
Technology : Cyberbullying
secondary prevention among the
population. One of the negative impacts that arise
with the existence of this Information
Moreover, at present these technological Technology is the emergence of the
and internet modes are not only safe but phenomenon of Cyberbullying among children
also an effective strategy to deliver health and adolescents. Cyberbullying or cyber
care interventions by concurrently violence is more painful than physical violence.
maintaining social distance and isolation "Victims of cyberbullying are often depressed,
during the pandemic. feel isolated, treated inhumanely, and helpless
when attacked," the researchers said. However,
It is also important to understand that the the researchers found that victims of
technology based intervention should be cyberbullying experienced higher rates of
individually tailored with a certain degree depression.
of self-monitoring, personalized feedback
The impact of cyberbullying on victims
to meet the need of the afflicted population.
does not stop at the depression stage, but
However, the undesirable aspect of
has reached a more extreme action, namely
technology-based intervention programs
suicide.
can also not be ignored and it is of vital
importance to recommend or form the Based on the results of the questionnaire
guidelines for its usage as an intervention distributed to middle and high school
to prevent potential hazards or addiction students in the cities of Magelang,
associated with it.[7] Yogyakarta and Semarang, information
was obtained that the phenomenon of
Impact of Information Technology and
cyberbullying has occurred among our
Internet in Businesses
youth. Although there have not been very
Information technology and the serious cases, there have been quite a
Internet are not only important factors to number of teenagers who have experienced
facilitate communication etween people ut cyberbullying, as many as 28% of the 363
also a means of creating new usiness students.
models changing company growth and
The perpetrators of cyberbullying are
transforming them. in a positive direction.
mostly school friends and the sex is mostly
The Internet can e seen as a strategic
male. All students were asked whether they
resource where companies can promote
had heard of or knew of other people
their work and services and expand into
experiencing cyberbullying, the results
new markets. Companies using this new
were 60% of respondents said they had
technology can e more efficient in
heard or knew about it. In addition to
conducting their usiness activities and
finding out whether students have ever
create a competitive advantage. E-
been victims of cyberbullying, they were
also asked whether they have been
perpetrators of cyberbullying. As a result,
32% of students said they had done
cyberbullying and the most popular means
of doing so was using social networking
sites. However, it can be seen from the
results of the questionnaire and the
comments given by students that the term
«cyberbullying» is relatively new to them
and many still do not understand the
dangers of cyberbullying. This is evident
from the number of students who still
consider cyberbullying as something that is
normal for teenagers.
Cyberbullying is not only a problem for
teenagers but is also the responsibility of
other stakeholders including parents,
schools, communities, law enforcers and so
on.[]

I. Conclusion
Perkembangan Teknologi Informasi
sangat Bermaanfaat bagi seluruh Umat
manusia karena denga ada nya Teknologi
Informasi Memudahkan seseorang untuk
mencari informasi, tidak hanya itu dengan
teknologi informasi ini kita dapat juga
berhubungan dengan seseorang tidak hanya
itu Teknologi informasi juga Banyak
bermaanfaat bagi Pendidikan karena
mudahya terhadap akses informasi
Pelajaran. Meski dengan mudahnya
Teknologi Informasi masih saja ada
Kelemahan nya yaitu Keamanan didunia
Teknologi Informasi juga ada nya juga
Kejahatan yaitu hacker/cracker. Maka dari
itu kita juga perlu waspada dalam
Teknologi Informasi, dapat berdampak
pada Diri kita maupun orang lain.
Reference :
[1] Rahmawati, D. (2008). Analisis Faktor Faktor yang Berpengaruh Terhadap Pemanfaatan
Teknologi Informasi. Jurnal Ekonomi dan Pendidikan, 5(1).

[2] Setiawan, D. (2018). Dampak perkembangan teknologi informasi dan komunikasi terhadap
budaya. JURNAL SIMBOLIKA: Research and Learning in Communication Study (E-
Journal), 4(1), 62-72.

[3] Hamidi, F., Meshkat, M., Rezaee, M., & Jafari, M. (2011). Information technology in
education. Procedia Computer Science, 3, 369-373.

[4] Wahid, F. (2005). Peran teknologi informasi dalam modernisasi pendidikan bangsa. Media
Informatika, 3(1).

[5] Bates, D. W., & Gawande, A. A. (2003). Improving safety with information technology. New
England journal of medicine, 348(25), 2526-2534.

[6] Rahayu, F. S. (2012). Cyberbullying sebagai dampak negatif penggunaan teknologi


informasi. Journal of Information Systems, 8(1), 22-31.

[7] Dixit, S., & Nandakumar, G. (2021). Promoting healthy lifestyles using information
technology during the COVID-19 pandemic. Reviews in cardiovascular medicine, 22(1).

[8] Berisha-Shaqiri, A. (2014). Impact of information technology and internet in


businesses. Information technology, Q2.

[9] Stolterman, E., & Fors, A. C. (2004). Information technology and the good life.
In Information systems research (pp. 687-692). Springer, Boston, MA.

[10] Akram, W., & Kumar, R. (2017). A study on positive and negative effects of social
media on society. International Journal of Computer Sciences and Engineering, 5(10), 351-
354.

You might also like