Information Technology in a Global Society
Curriculum Guide 2013/2014
Higher and Standard levels
Content
Assessment objectives 3
Timeline with focus on strands during the academic year 2012-2013 4
Timeline with focus on strands during the academic year 2013-2014 5
Topics covered with links to different strands 6
Scheme of work for 2013/2014 13
Internal Assessment 17
General teaching resources 18
ITGS Curriculum Guide 2013/20142
Assessment Objectives:
AO1: Assessment Objective 1: Knowledge and understanding of a specified content
Demonstrate an awareness of IT applications and developments in specific scenarios Demonstrate an awareness of the social and ethical significance of specified IT applications and developments Demonstrate technical knowledge of IT systems Demonstrate knowledge of ITGS terminology, concepts and tools Demonstrate knowledge and understanding of topics related to annually issued case study (HL only)
AO2: Assessment Objective 2: Application and analysis
Explain the impacts of IT applications and developments in specific scenarios Analyze the social and ethical significance of specified IT applications and developments Transfer IT knowledge and make connections between specific scenarios Apply technical knowledge of IT systems acquired through independent research to provide supporting evidence in possible decisions relating to
future courses of action related to the annually issued case study (HL only)
AO3: Assessment Objective 3: Synthesis and evaluation
Evaluate local and global impacts of specified IT developments through individually researched studies Evaluate a solution involving IT to a specified problem using the knowledge of IT systems Discuss the social and ethical implications of specified IT policies and developments Evaluate, formulate and justify possible strategic courses of action related to the annually issued case study (HL only)
AO4: Assessment Objective 4: Use of ITGS skills
Demonstrate evidence of project management in the development of a well- organized product to resolve a specific issue Use IT tools and PDLC to create an original product in consultation with a client Demonstrate evidence of the use of appropriate techniques to develop an original IT product
Timeline with focus on strands during the academic year 2012-2013:
ITGS Curriculum Guide 2013/20143
Course Strands Sept 12 Oct 12 Nov 12 Dec 12
Jan 13 Feb 13 March 13 April 13 May 13
Strand1: Social and ethical Issues
Intro to course:
Stands
Triangle approach
Social and Ethical issues
News articles
HL Ext:
Intro to case study
PrivacySecurityAuthenticity
AO2
SecurityPrivacyStandards and protocols
revision
AO1SurveillancePoliciesGlobalization and cultural diversity
Exams
Digital Divide andEquality of access
Reliability
Privacy
Integrity
Reliability
Authenticity
Standards and Protocols
IntegrityReliabilityAuthenticityIntellectual propertyDigital citizenship AO3
IA:AO4IntroductionCriteriaProject samples
Revision
Strand2 : Theme Business and Employment-Gov and Politics-Home and Leisure
HL:Dragon Taxi Case Study AO1, AO2
Robotic at war
Business and Employment-Gov and Politics-
HL:Dragon Taxi Case Study
AO3
Gov and Politics-Health-Business and Employment
HL:N&Q Case studyAO4Expert systems
Education and training- Business and Employment- Home and LeisureAO2
HL:
Artificial Intelligence
Environment- Gov and Politics-Health
HL:Robot assisted surgery
AO2 AO3Intro to Paper 2 with different social / ethical issues and IT
Introduction to IA
systemsHome and Leisure-Education and trainingBusiness and EmploymentGov and Politics
HL:N&Q Case study
Strand 3:IT systems
Hardware: AO1I/O devicesNFC-Biometrics-physical security-data security-hazards-malwareNetworks:TopologiesP2pClient/serverVPNRouter, bridge, gatewayProtocolsCablingCloud computing
AO1 AO4Spreadsheets:Cell referencingWhat ifFormula
Software:OSSystem utilitiesDefragmentationVirus scanningMalwareSpyware
Data collection: Loyalty scheme
Database:Data redundancyRelational Vs flatValidationVerificationData matchingData miningDNA Data
Database ProjectAO4
Crime:Digital fraudOnline fraudOffline fraudHackingMalwareSpywareDOS AttackLaw enforcement
Intro to Project management.AO1 AO2Multimedia:DreamWeaver -FlashPhotoshopCSS-HTMLJavascriptWebshostingWeb design ProjectAO4
Internet andPersonal and Public communications:Internet filters-AlgorithmsGPS-PDA- Smart phonesWeb2.0: Blogs-Wikis-RSSSocial bookmarkingHTTP-DNS-ISPUpload/ downloadPiracyBandwidthGov online systems/ portalsRfIDs AO3
HL Extension:
It systems in organizations:
Gantt chartPERT chart
Agile VS waterfall methodologies
Data flow diagrams
Entity-Relationship Diagrams
Timeline with focus on strands during the academic year 2013-2014:
ITGS Curriculum Guide 2013/20144
Course Strands Sept 13 Oct 13 Nov 13 Dec 13 Jan 14 Feb 14 March 14 April 14
Strand1: Social and ethical Issues
IA:Project development- Criteria A, B, C, D, E AO4
Modeling and Simulation
VisualizationVirtual reality
HL Extension:
Case study for 2014 examAO1 AO2 AO3
Paper2:
PrivacySecurityAuthenticity
AO2Paper2:ReliabilityDigital divide
IA Final Submission: Product and documentation on a CD.
Paper2
AuthenticityIntellectual Property
Mock Exams:
Paper1Paper2Paper3
s.
Security
Digital divide
Digital citizenship
Revision for final exams using past IB papers
Strand2: Theme Business and Employment-Government and Politics-Home and Leisure
HL Extension:Education:Case study for 2014 exam AO2 AO3
Environment-Government and Politics-Health
HL Extension:Education:Case study for 2014 exam AO2 AO3
Government and Politics-Health-Business and Employment
HL Extension:Education:Case study for 2014 exam AO2 AO3
HealthEducation
HL Extension:Education:Case study for 2014 exam AO2 AO3
Strand 3:IT systems E-commerce
Database and Cloud computing news articles for Paper2.
IA: Product and All Criteria DueProject development- Criteria A, B,C, D, E AO4
E-waste
IA: Product Beta TestingProject development- Criteria A, B,C, D, E AO4
AO1 AO2 AO3
HardwareSoftware piracyNetworksDatabase in news articles
HL Extension:RoboticsExpert systemsArtificial Intelligence news articles
AO1 AO2 AO3
News articles related to different IT systems
Topics covered with links to different strands:
ITGS Curriculum Guide 2013/20145
Theme Topic Examples covered
IT systems links covered Social and Ethical issues links covered
Assessment
Business and Employment
Traditional Businesses
ATMEFTHotelsSupermarketsCar agencyHospitals
HL extension:
Robotics at factories
Input/ output devices: manual (keyboard, key pad, microphone, pointing devices) and automated data entry (cards, webcam, sensors, OMR, OCR).
Data and information:Input, output and processing: data to information.
Relational Database management systems: relationships, tables, records, fields, key fields, validation rules, verification, macros, forms and reports.Student created full relational databases using MS Access.
Spreadsheets: cells, functions and formulae.Students used MS Excel to create spreadsheets for different applications.
Networks: LAN and WANNetwork topologies hardware and pros and cons related to speed, application and costNetworking devices and Cabling systemsServers: typed of servers,Backup domain serverWorkstations/ clients, thin client.P2P networksFirewall and proxyKey loggers, auditing, staff monitoring
Benefits of using RDMS Vs. flat file DB.
Privacy issues related to the amount of information collected
Authentication methods and produces of limiting access to certain areas.
Copyrights issues related to P2P.
Security measure taken to protect the information on the network: Data security and physical security
Employee monitoring: justified by employers, but is this ethical?
Comparison between issues raised by passwords vs. biometrics as methods of authentication.
Intro to project management:PDLCClient, end user, developer.Data collection techniques:Testing and documentationEnd user training
HL extension:SDLCData flow diagrams
Test on the following topics:
Hardware components of the computer
Database Management Systems
Computer Networks
Group projects:
Computer Networks Project
MS Access Database Project
HL Test:
ITGS Curriculum Guide 2013/20146
Biometrics: Finger scan, retina scan, iris scan. Digitization of scan, storage of numerical presentation of scan in database.
HL Extension:Robotics:Input, output devicesSensor to detect surroundingsArtificial Intelligence:HeuristicsReasoningMachine learning
Expert systems: Inference engine, knowledge base, user interface, if then rules.
Entity relationship diagramsGantt chartPERT chartDevelopment methodologies: Agile VS waterfallPM methodologies.
Unemployment and deskilling issues related to the use robotics in industry.
Robotics, Expert systems and Artificial intelligence
Online business TeleworkingOnline banking Networks used to link different
branches: hardware and software requirementsHardware required for teleworking
Website tools to facilitate working from home.
Cloud computing: Hardware and software requirements. Examples: SkyDrive, DropBox and iTunes.
E-commerce: B2B, C2B, C2C and examples of shell bidding on e-bay.
Digital Crime: Denial of service implications on businesses.
Consequences of online threats such as phishing, hacking and identity theft.Honey pots and online banking related security measures.
Pros and cons of teleworking for different stakeholders
Laws to combat the above threats
Threats of cloud computing. How far do we trust it? What is the price of free storage?
Test on the following topics:
Internet
Computer Networks
Database Management Systems
Data collection
Transportation Traffic controlIT systems in cars
Radio Frequency Identification Systems: RfID tag, Rfid transponder, reader
Issues related to the use of such systems for the purpose of tracking and surveillance Jan Exam:
ITGS Curriculum Guide 2013/20147
Automated toll gatesOyster card
Near Field communication. Smaller range
Networks required for data transmission
Data collection: Sensors, speeding radars and
CCTV: hardware, video editing software, advanced cameras equipped with sensors to follow target,
Smart cards: Microchips and magnetic cards.
Protection of data during and after transmission using VPN, SSL and encryption.
Reliability of the hardware used and consequences of errors cause by lack of data integrity: deliberate or accidental.
People and machine: increased reliability on machines for control.
All topics covered
Education and Training
Distance learning over large areas
School portals
Use of IT in teaching and learning
Hardware used in the classroom
Website tools: the importance of ease of navigation using flash buttons and hyperlinks. Students used Dreamweaver to create their own websites applying the tools required to ensure consistency of pages and content: CSS and frames.
Protocols: HTTP, HTTPS, FTP and TCP/ IT
Internet: Web 2.0 tools such as RSS feeds, social networking and live chat rooms
Networks: Wi-Fi, Broadband connection, bandwidth.
Classroom hardware: Laptops, tablets and Interactive boards.
Issues related to Intellectual Property of copyrighted material shard on circulated by students and teachers.
Advantages of such systems for different groups of stakeholders.
The need to train teachers, student and parents to use the technology. Issues related to cost, deskilling, unemployment and new jobs.
Concerns regarding the costs required to improve the school infrastructure to accommodate the demands of the new system.
Hardware issues: who is responsible for the hardware
Test on the following topics:
IT related Crime
Internet
HL Test:
Taxi Case Study
ITGS Curriculum Guide 2013/20148
damages? Students bringing their own gadgets, what is wrong with that?
How does IT help students with learning disabilities?TOK link: Digital divide links.
Does the use of IT gadgets in class really improve teaching and learning? Or is just luxury?
Environment Data logging Traffic controlScience projectsStudying marine animals
Automated data logging: Sensors, probes, portable devices, open loops, closed loops, feedback.
Reliability of data collected by sensors and probes
Calibration of sensors to collect correct data
Mapping Google mapsGPSMobile tracking
GPS: helpful features for drivers and companies. Triangulation using satellite systems and communication towers.Remote sensors to help collect data from a distance, data collected can be transmitted to computer stations analyzed using special software.
Concerns regarding sharing data with third parties.
Pros and cons of tracking for different groups of stakeholder, for examples, the Government.
Benefits related to scientific research and environmentalists.
Test on:
Automated data logging
Health Improved medical servicesMedical information, administration, marketing and sales.
Patient monitoring watches
HL Extension:
Automated data logging Sensors, probes, portable devices, open loops, closed loops, feedback.
Networks: Used to transmit information from patients to medical centers computers.
Internet: Patients to login and upload the data collected by their devices.
Analysis of the data collected and the privacy concerns related to storing and sharing medical information with third parties. Identity theft, blackmailing, losing jobs, discrimination and rejection of medical insurance.
Data Protection Act:Subject rights: What are your
HL Test:
Robotics, Expert systems and Artificial intelligence
ITGS Curriculum Guide 2013/20149
Robotic assisted surgery
Database: Data Matching and Data mining techniques to analyze stored Electronic health records.
HL Extension:Robotics:Arms, tentacles, control unit, controllers, computer visionArtificial Intelligence:HeuristicsReasoningMachine learning
Expert systems: Inference engine, knowledge base, user interface, if then rules.
rights?8 Principles of DPA that organization handling your information need to abide by.
HL Extension:Who is responsible for mistakes caused by the use of robotics-assisted surgery? Who is to blame?
Physical Considerations
Ergonomics
People with disabilities
Ergonomic hardware: mouse, wrist pad, keyboard.
Speech recognition software to help users with speech disabilities.
Concerns regarding the ability of the speech recognition software to convert speech into correct text. Example, Siri needs to be trained to your accent, tone of voice and methods of pronunciation.
Home and Leisure
Homes and home networks
IT management of home systems
Social networking
Published and broadcast information
Multimedia
Network setup: hardware devices and software requirements.
Combination of wireless and cabled networks.Client/ server Vs. P2P.Network security: firewall and proxy
Web 2.0 tools: Chat rooms, instant messaging, blogging, wikis and file sharing.
Hotspots: login, authentication and security measures.
Pros and cons of client/ server and P2P home networks.
Threats of hotspots
Addiction to social networking websites
Employee screening using social networking websites. Is this ethical?Why we tend to tell more about ourselves online?
Intellectual property of material
Test on:
Multimedia and Web 2.0 tools
Presentation: Crime
Project: Video Production
ITGS Curriculum Guide 2013/201410
Image manipulation
HL Extension:
Smart systems
Multimedia systems:
Hardware and software requirements
File types
CompatibilityHL Extension:Embedded systems used at home and in cars.
posted on micro blogging websites such as twit pic.
Terms and conditions of Social networkingSites.
Copyright issues on video/ image sharing sites such as YouTube and Flickr.
Politics and government
Government portals and information websites
Access to updated travel warning, tourist information, policies, visa requirements, national events, contact details.
Website: citizens to login to their accounts, registration could be required to some area of the portal/ website. Links to different services.
Internet: Infrastructure hardware and software requirements.
Pros and cons of Government portals.
Project:
Website Design using Adobe Dreamweaver
Government databases
Biometrics data
Internet censorship
Personal information held by Government such as:
Car registrationBike rentalsTransportation cards (Oyster, SALIK)SchoolsHospitalsTaxPassports
Central Database: located and maintained in one location, unlike a distributed database.
Data matching: matching records from different databases to build full profiles.
Data mining: extracting hidden information looking for patterns.
Smart cards used by citizens as Identification cards.
RfID used to collect information automatically on the go.
Too much information controlled by the Government. A concern regarding how secure the information stored is.Who get access to it? How is it used?
Analysis of the data collected and the privacy concerns related to sharing the information with third parties. Identity theft, blackmailing, losing jobs, discrimination and rejection of medical insurance.
End of year exam: All topics
IA: Criteria A, B, C
ITGS Curriculum Guide 2013/201411
Airports
HL Extension:
Robotics at war
Internet:
Government applied proxies and filter to control the content access by the citizens.
HL Extension:Robotics:Unmanned vehicles.Remote sensorsWeaponsComputer visionArtificial Intelligence:HeuristicsReasoningMachine learning
Expert systems: Inference engine, knowledge base, user interface, if then rules.
Data Protection Act:Subject rights: What are your rights?8 Principles of DPA that organization handling your information need to abide by.
How far does Internet censorship affect different groups of stakeholders?
Who benefits from Internet censorship?
HL Extension:
Concerns related to the use of robotics at war with respect to digital divide, inequality of access and reliability.
Scheme of work for 2013/2014
ITGS Curriculum Guide 2013/201412
Theme Topic Learning Objectives Resources Assessment
Business and Employment
The use of Cloud computing by businesses.
Demonstrate technical knowledge of the components of the cloud computing in terms of hardware, software and processing.
Explain the impacts of using cloud computing on businesses, employers and employees.
Examples of cloud computing:Dropbox .comSkydrive.com
Cloud computing explained:http://www.techradar.com/news/internet/cloud-computing-explained-1105688
Formative:
Make a list of all the IT terms mentioned in the article. Find their definitions.
Education
Health
The use of Cloud computing in different applications such as: Education and Health
Transfer IT knowledge and make connections to different themes such as education: Benefits and drawbacks of using cloud computing in schools.
Demonstrate the technical knowledge of the authentication methods developed to improve the security of data and applications on the cloud. Make connection to hospital applications
Evaluate those authentication methods.
Cloud security:
http://www.technologyreview.com/news/515081/microsoft-and-ibm-researchers-develop-a-lie-detector-for-the-cloud/
Formative:
Article analysis
Business and Employment
The combined use of two IT systems: Cloud computing and databases in businesses.
Paper2 Article analysis: Cloud computing and Databases
Making the Cloud more efficient:
http://web.mit.edu/newsoffice/2013/making-cloud-computing-more-efficient-0312.html
Paper 2 Analysis
Summative:Paper2After Eid break (Oct, 20-24):
Arts and LeisureGovernment and politics
Simulation and virtual reality
Demonstrate technical knowledge of the components of simulation systems in terms of hardware, software and processing.
Explain the impacts of using simulation computer game developers and users.
Evaluate the pros and cons of using simulation models to test new
Students to test the simulation model of the traffic system:http://www.traffic-simulation.de/
Additional resources doc on the Portal
Formative:
ITGS book p.307Exercise 14-14
Choose an article from the Additional resources doc and
ITGS Curriculum Guide 2013/201413
products, roads or bridges. analyze it in Paper2 format.
Environment Visualization Transfer IT knowledge and make connections to: Benefits and drawbacks of data visualization for environmentalists and scientific researchers.
Demonstrate the technical knowledge of how a visualization software works
Evaluate the pros and cons of data visualization with respect to reliability and people and machines.
Visualization task in tasks and assessments folder under resources tab on the Portal.
Links to articles about visualization in the Additional resources doc on the Portal
Visualization task
Environment Visualization and remote sensors
Examine the use of combined systems to study marine life.
Evaluate the pros and cons of using such systems.
ITGS exam paper question
Environment E-waste Identify the sources of E-waste Identify the negative effective of
inappropriate disposal of hardware items on the environment.
Suggest and evaluate some effective methods to avoid E-waste.
Evaluate the effectiveness of e-books in reducing E-waste.
ITGS book page. 244-250Formative:
Book questions in page 250.
Summative:
E-waste Portfolio
Business and Employment
Software Compare and contrast the different types of software available in the market
Evaluate the pros and cons of commercial software, bespoke and open source.
Analyze the reliability issues related software and the effects on different stakeholders.
ITGS book pages 55-57Formative:
Examine software related accidents in P.63
Summative:
Last week on Nov. Paper1: All topics
Business and Employment
Software piracy
Identify what is and in not software piracy. ITGS book page. 275-276
Exercise 13-12 page. 286
ITGS Curriculum Guide 2013/201414
Government and politics
Identify the different types of licensing and each means.
Evaluate the impact of copyright infringement on different stakeholders such as software developed and users.
Business and Employment
Government and politics
Internet Compare between the meanings of the
terms Internet and the WWW. Understand the basics of the Internet
infrastructure: Backbone, DNS, Protocols, Trace route.
Outline the concepts of network neutrality and its opposite two tier Internet.
Discuss the pros and cons of network neutrality.
ITGS book pages 80-84
News article related to Internet Failure.
Formative:Exercise 4-9
Article analysis
Government and politics
Online voting and online campaigns
Identify the IT requirements for setting up and e-voting system
Explain the authentication techniques required carried out by the citizens.
Compare different voting methods Evaluate the pros and cons of online
voting.
ITGS book pages 294-297Formative:Exercise 14-3
P. 295
Summative:
HL ExtensionCase study: for use in May and Nov 2014
E-book publishing
Understand the meaning of the IT terms related to the case study.
Explain how the IT systems mentioned in the case study work in a social context.
Case study bookletInternet: computerhope.com for definitions.ITGS book
Formative:Students to create their own bank of questions using IB command terms.
Examine both local and global areas of impact (education, business, health, entertainment…) with respect to e-book publishing.
Evaluate the social and ethical issues of e-book publishing on different stakeholders.
News articles related to e-book publishing:http://litlove.wordpress.com/2013/01/08/ebooks-publishing-shoots-itself-in-the-foot/
http://toc.oreilly.com/2012/11/ebook-
Formative:
Article analysis
ITGS Curriculum Guide 2013/201415
problem-areas-that-need-standardisation.html
Discuss the challenges faced by different stakeholders with respect to publishing e-books.
Evaluate the solutions suggested to improve e-book publishing and suggest future developments.
http://www.digitalbookworld.com/2012/six-essential-issues-in-any-ebook-contract-negotiation/
Formative:
Article analysis
Develop the skills to create and publish a simple e-book, which includes different types of media: test, images, videos and other media components.
MacBookiBook AuthoriPads
Formative:
Create and publish an e-book
Internal Assessment:
ITGS Curriculum Guide 2013/201416
IA dates
May 20th: Criteria A, B and part of C September 15th: Criteria C, D, E and Product for Beta testing November 10th: Product due for second Beta testing December 15th: IA Final Submission
Submission:
1. The following four components need to be on the submission CD:1. Cover page: The page that contains all the links to the forms and the product The page should be called [cand-no]_[cand-name]_coverpage.htm2. Documentation: Criteria A, B, C, D, E, F all saved in their appropriate forms. 3. Product: the IT solution. It should be linked to the cover page. 4. Screencast
2. CDs should be labeled clearly with candidate’s name and number
Reminder: All students are encouraged to refer to the previous ITGS project examples, which scored 7. Link is posted on the school Portal.
General teaching resources:
ITGS Curriculum Guide 2013/201417
Portal: resources tab Teach-ict.com Delicious account, username: uasit- password: resources2010 for sharing IT related news articles Itgsuasd.wikispaces.com American scientific IT related news articles Topdocumentaryfilms.com Information Technology and you book Gift of fire book Information Technology in a Global Society Book MS ACCESS MS EXCEL Adobe Dreamweaver Adobe Flash Animation Adobe Photoshop Information systems for you book + PDF file for IT systems in Organizations available on Portal IA project which scored 7 available on Portal
ITGS Curriculum Guide 2013/201418
Top Related