TIC Apuntes
TIC Apuntes
is an extensive sector
enclosing any communication device or application, including radios,
televisions, cellular phones, computers, network hardware, software,
satellite systems, as well as the various services and applications associated
with them, such as videoconferencing and distance learning.
ICT COMPONENTS
2. SOFTWARE: Software refers to the applications and operating systems that run
on the hardware. This includes everything from the iOS on a smartphone to
complex data analysis programs used in research. Software solutions enable the
analysis, manipulation, and presentation of data, which is crucial in various
aspects of ICT.
3. TELECOMMUNICATIONS: This area of ICT includes services like the internet,
wireless networks, and satellite technology. It's the backbone of modern
communication, enabling data and information to be transmitted globally in
seconds. This component has revolutionized how information is shared and
accessed, making global communication seamless and instantaneous.
1. HARDWARE
a. COMPUTERS: These are the foundational tools of ICT, comprising both personal
computers
(PCs) and mainframes used by larger organizations. Modern computers have evolved to
offer
higher processing power, allowing for complex data analyses and support of advanced
software applications.
b. SERVERS: Servers are powerful computers that store, send, and process data. In the
context of
ICT, they are crucial for hosting websites, running business applications, and storing
large
amounts of data. They can be physical machines located in a data center or virtual
servers
hosted in the cloud.
2. SOFTWARE
Examples include: Windows, macOS, Linux, and the mobile OS like Android and
iOS. The OS is crucial for the functioning of computers and mobile devices, managing
resources and providing a user interface.
• ICT has:
ENHANCING COMMUNICATION
Technologies like email, instant messaging, and video conferencing allow individuals
and organizations to
interact seamlessly, irrespective of their physical locations.
These tools have become integral in driving social movements, political campaigns,
and fostering global discussions on critical issues.
• PUBLIC DIPLOMACY AND INTERNATIONAL RELATIONS: ICT enables governments
and diplomatic agencies to engage directly with foreign publics, enhancing
diplomatic efforts and public diplomacy.
1. DATA MANAGEMENT AND ANALYSIS: Advanced software tools allow for efficient
management and analysis of vast amounts of data. Tools like spreadsheets,
databases, and specialized statistical software are crucial in fields like international
relations for policy analysis, economic forecasting, and demographic studies.
In international relations, these technologies canbe used for predictive analytics, risk
assessment, and even in diplomatic strategy
formulation
CONCLUSION
HISTORICAL
PERSPECTIVE
1. EARLY BEGINNINGS:
2. THE BIRTH OF
COMPUTERS:
The mid-20th
century saw the
development of the first
electronic computers like
ENIAC, (completed in
1945)which were initially
used for complex
calculations in scientific
research and military
operations.
4. PERSONAL COMPUTING
REVOLUTION:
The
creation of the internet in the
late 20th century revolutionized
information sharing and
communication. Tim Berners-
Lee’s invention of the World
Wide Web in 1989 further
facilitated the accessibility and
spread of information globally
RECENT INNOVATIONS
3. BLOCKCHAIN:
FUTURE TRENDS
3. 5G NETWORKS:
CHALLENGES AND
OPPORTUNITIES
1. CYBERSECURITY:
As ICT evolves,
cybersecurity emerges as a
paramount concern. The increasing
interconnectivity and the growing
number of connected devices amplify
vulnerabilities to cyber-attacks,
data breaches, and hacking
incidents. Protecting information and
maintaining privacy in an increasingly
digital world presents both a
challenge and an opportunity for
innovation in cybersecurity measures.
2. PRIVACY CONCERNS:
The digital age has raised significant
privacy issues. Technologies like AI
and big data analytics, while
beneficial, also pose risks regarding
data privacy and surveillance.
Ensuring user privacy and consent
in data collection and processing is
a growing concern that requires
stringent data protection laws and
ethical practices.
2. ETHICAL CONSIDERATIONS:
a) Data:
basic representations of elements of the reality, that tend to show up in set of
numbers or alphanumeric inside a document or inside an information system in a
physical or electronic format.
• Data itself does not have inherent value, it is because the human ability to relate them
and interpret them and convert them into information that they acquire value.
b) Information:
• Information can modify and influence the way the receiver feels, acts and behaves. In
consequence, for an Intelligence Service Information is all set of data, news,
documents,
that does have potential interest as natural resource to produce Intelligence.
c) Document:
a) Identification
b) Analysis
c) Synthesis
d) Contextualization
e) Assessment
a) Implicit.
b) Explicit.
1. Socialization.
2. Externalization.
4. Interiorization.
7. ANALYZING DATA:
Once you have your data, you'll need to analyze it to see if it supports
or refutes your hypothesis. This could involve statistical analysis or
thematic analysis of qualitative data.
8. DRAWING CONCLUSIONS:
Based on your analysis, what can you conclude about your hypothesis?
Be sure to consider whether your findings can be generalized or if they
are specific to the cases you studied.
9. REPORTING FINDINGS:
Present your research in a clear and organized manner, whether it's
through a paper, presentation, or publication. Include your
methodology, findings, and any limitations of your study.
RESEARCH TYPOLOGIES
1. QUALITATIVE RESEARCH:
Qualitative Research focuses on understanding the meaning and
characteristics of human behavior and social phenomena. It explores
the 'why' and 'how' of decision making, not just 'what', 'where', and
'when'. It often involves collecting rich data from a smaller number of
cases.
2. QUANTITATIVE RESEARCH:
Quantitative research is about quantifying relationships between
variables. It uses statistical methods to test hypotheses and typically
involves the collection of numerical data that can be analyzed using
statistical techniques.
3. PRIMARY RESEARCH:
Primary research involves the collection of new data that has not been
previously collected. It's firsthand evidence related to your research
question.
4. SECONDARY RESEARCH:
Secondary research involves the summary, collation, and/or synthesis
of existing research. It uses data that has already been gathered by
others and is available in various forms like books, articles, reports, or
datasets.
Sources
1.Definition:
Primary sources are original, firsthand documents or records of events, experiences, or
observations. They provide direct evidence about a topic or subject without any
interpretation or commentary.
Unedited, original, factual, and time-specific.
2. Examples:
a. Documents and Records: Letters, diaries, government documents, legal records,
and original
manuscripts.
b. Artifacts and Objects: Physical objects like artifacts, relics, clothing, or artwork from
the period
being studied.
c. Statistical Data: Original data collected through surveys, experiments, or
observational studies.
d. Audio-Visual Materials: Photographs, audio recordings, videos, films, or broadcasts
from the
time of study.
e. Interviews and Surveys: Direct interviews, questionnaires, or surveys conducted by
the
researcher.
3. Usage in Research:
Used to provide direct, unfiltered access to the subject of study. Primary sources are
essential for understanding the context, event, or phenomenon in its original for
SECONDARY SOURCES
1. Definition:
Secondary sources interpret, analyze, or summarize information from primary sources.
They offer second-hand accounts and provide commentary or criticism on the original
material.
Analytical, interpretative, evaluative, and reflective of the author’s perspective.
2. Examples:
a. Books and Articles: Academic books, journal articles, reviews, and critiques that
discuss,
analyze, or interpret primary sources.
b. Biographies: Accounts of a person's life written by someone else.
c. Documentaries: Films or television programs that provide a historical account or
analysis based
on primary sources.
d. Encyclopedias and Reference Books: Summarize information on a particular topic,
providing an
overview based on various sources.
e. Textbooks: Educational books that provide a summary and interpretation of
knowledge on a
subject.
3. Usage in Research:
Used to gain an understanding of the context, interpretation, or second-hand analysis
of
events, phenomena, or subjects. Secondary sources are vital for building theoretical
frameworks, literature reviews, and understanding the current state of research on a
topic.
INFOXICATION
1. CRAAP Test:
• Currency: How recent is the information? Is it up-to-date and relevant
to your current research needs?
2. Source Origin:
• Primary vs. Secondary:
3. Cross-Checking Information:
• Verify information by cross-referencing with other credible sources.
• This helps in confirming the accuracy and reliability of the data.ç
CRITICAL THINKING
• Critical thinking is a rich concept that has been developing throughout the
past 2,500 years. The term "critical thinking" has its roots in the mid-late
20th century.
• In order to obtain Useful Knowledge, it is vital to apply Critical Thinking.
• Everyone thinks; it is our nature to do so. But much of our thinking, left to
itself, is biased, distorted, partial, uninformed or down-right prejudiced.
Yet the quality of our life and that of what we produce, make, or build
depends precisely on the quality of our thought. Shoddy thinking is costly,
both in money and in quality of life. Excellence in thought, however, must
be systematically cultivated.
➢ Definition.
ii. gathers and assesses relevant information, using abstract ideas to interpret it
effectively comes to well-reasoned conclusions and solutions, testing them
against relevant criteria and standards;
Power point
PROJECT MANAGEMENT
• ICTs significantly enhance the planning phase of projects by
providing platforms for brainstorming, scheduling, and resource
allocation, all of which are accessible by team members
anywhere in the world.
• During the execution phase, ICT tools enable real-time
communication and problem-solving, allowing for immediate
adjustments and updates. This real-time capability is crucial
for managing the dynamic nature of international projects,
where external factors such as political changes or market
fluctuations can impact project delivery.
UMOJA
• A notable case study illustrating
successful ICT application in
international project management
is the development and
deployment of the UN’s UMOJA
system, a digital transformation
initiative that integrates and
streamlines financial, human
resource, and supply chain
processes across the United
Nations system worldwide. The
use of a centralized ICT platform
has improved operational
efficiency, transparency, and
accountability in UN projects
globally.
Project
Management
• The integration of ICT
tools in project
management thus
offers enhanced
coordination,
efficiency, and
adaptability, essential
qualities for the
successful execution
of international
projects in the complex
and fast-paced
environment of
International Relations.
METHODOLOGIES
Comparative Analysis
1. Comparative Analysis:
This methodology involves comparing
two or more cases or entities to understand their differences and
similarities. It is particularly useful for identifying best practices or
explaining variations across cases.
b) Cross-National Comparisons:
Analyzing how different
cultures negotiate treaties or resolve conflicts, comparing
practices across various regions.
2. Historical Analysis:
Historical analysis in international
relations involves studying past events to understand current
international systems and predict future trends.
a) Archival Research:
Examining historical documents, treaties,
and records to understand the genesis of current international
laws or institutions.
3. Theoretical Analysis:
1. Realism:
Realism focuses on the anarchic nature of the international
system, the primacy of state actors, national interest, and the importance
of
military power.
Example: The South China Sea Dispute: Through a realist lens, the
territorial disputes in the South China Sea can be viewed as a power
struggle, primarily between China and other regional actors like the
Philippines, Vietnam, and Malaysia. Realists argue that China's military
buildup and territorial claims in the region are driven by its national interest
to secure maritime routes and assert regional dominance. Similarly, the
United States' freedom of navigation operations can be seen as an effort to
maintain balance of power and protect its own strategic interests in the
region.
2. Liberalism
3. Constructivism:
Constructivism focuses on how international
relations are socially constructed through the interaction of ideas,
norms, and beliefs.
Example: The Rise of Humanitarian Interventions:
Constructivists would analyze the growing acceptance and
practice of humanitarian interventions, such as NATO's
intervention in Kosovo or the discourse surrounding the
Responsibility to Protect (R2P) norm, as a shift in international
norms regarding sovereignty and human rights. They would
argue that these interventions are not merely the result of
material power dynamics but are deeply influenced by changing
moral standards, identities, and discourses in the international
community.
DIPLOMACY DEFINITION
1. resolve conflicts
DIPLOMACY TODAY
DIGITAL DIPLOMACY
GLOBAL GOVERNANCE
• Global governance refers to the collective processes, norms,
agreements, and institutions that guide and regulate the
behavior of states, corporations, civil society, and individuals in
the international arena.
• Unlike global government, which implies a central authority,
global governance is a decentralized and multilayered
process involving various stakeholders at different levels, from
local to international.
• This global governance is carried out via international
institutions and international agreements.
EXAMPLES
These two
financial institutions play key roles in
global economic governance. The
IMF monitors the international
monetary system and provides
financial assistance and advice to
countries facing economic
difficulties. The World Bank,
meanwhile, provides loans and
grants to support development
projects (like infrastructure, health,
and education) in developing
countries, aiming to reduce poverty
and promote economic
development. 35
This
international treaty within the
United Nations Framework
Convention on Climate
Change (UNFCCC) aims to
combat climate change by
limiting global warming to
well below 2 degrees Celsius
above pre-industrial levels.
The agreement, adopted by
196 parties at COP 21 in Paris
in 2015, represents a
significant step in global
governance, as it requires
countries to set and pursue
their own nationally
determined contributions to
reduce greenhouse gas
emissions
• International
Telecommunication Union
(ITU): A specialized agency of
the United Nations, the ITU is
responsible for issues that
concern information and
communication technologies.
The ITU sets worldwide
standards that foster
seamless interconnection of a
vast range of communication
systems and addresses the
global management of radio-
frequency spectrum and
satellite orbits to prevent signal
interference across borders
This is the
first international treaty
seeking to address
internet and computer
crime by harmonizing
national laws, improving
investigative techniques,
and increasing cooperation
among nations. The
convention represents an
effort to create a common
framework to fight
cybercrime across the
globe.
• Example:
The European Union’s General Data Protection
Regulation (GDPR) represents a significant step towards
addressing privacy concerns on a global scale. The GDPR sets
strict guidelines for data protection and privacy for all individuals
within the European Union and the European Economic Area. It
also addresses the transfer of personal data outside the EU and
EEA areas. However, implementing such comprehensive
regulations globally is challenging due to varying legal
standards and cultural perceptions of privacy
DIGITAL DIVIDE
CYBERSECURITY THREATS