2.6 Politics & Government

external image MQ-1_Predator_unmanned_aircraft.jpg
  • Political processes, online campaigning, voting, lobbying, fund-raising and advertising.
  • Government information sites: travel warnings, tourism, environmental information and warnings, government policies, city government websites.
  • Access to, and updating of, personal information held on government databases.
  • Collection, storage and updating of personal data: for example, driving licence, TV licence, tax returns, passport applications and renewals, medical records, military service records, social security information, online police records.
  • Government control and use of information.
  • Censorship, data matching across agencies, archiving, biometric data, national identity cards.
  • Law and order Police surveillance, terrorist monitoring, DNA data.
  • Military Cyber warfare, smart weapons, espionage, battlefield technology.
  • The importance of IT is becoming increasingly evident in political campaigns. With increased amounts of information available to governments, ethical issues relating to its possible misuse are becoming more and more important.

Source: Information technology in a global society guide. 2012 onward.

EXPLAIN how Internet content can be filtered. (D)
EVALUATE the ethical and social impacts of Internet filtering. (D)
DESCRIBE the technologies used for electronic and online voting. (E)
EVALUATE the social issues related to electronic and online voting. (E)
DESCRIBE how data mining and social media are being utilized in political campaigns. (B)
EXPLAIN how government can use the Internet to provide services. (D)
DESCRIBE how emerging technologies are being used in military operations. (A)
EVALUATE the social and ethical impacts of the use of information technology for military purposes. (A)

ITGS Key Terms
ITGSopedia Political Processes
ITGSopedia Government information sites
ITGSopedia Access to and updating of personal information held on government databases
ITGSopedia Government control and use of information
ITGSopedia Law and Order
ITGSopedia Military
ITGS Textbook Chapter 14 Politics & Government

Required Reading
Information Technology in a Global Society, Stuart Gray. 1st Edition. © 2012 Stuart Gray. ISBN 9781468023619. Pages 290-308.This textbook has been developed independently of the International Baccalaureate ® This book was written specifically for the ITGS course, covering technical systems, social impacts and ethical issues, and each area of application.

Digital Planet: Tomorrow’s Technology And You, George and Ben Beekman. 10th Edition. © 2012 Pearson Education. ISBN 9780132091251.
Chapter 9: The Evolving Internet, pages 344-351. This book explains how various technologies work, how they are used to solve problems and extend human capabilities, and how our ever-growing network of digital devices affect our lives, our world, and our future.

Gift of Fire, Sara Baase. 4th Edition. (C) 2013 Pearson Education. ISBN 978013249267-6.
Government Systems: Pages 84-91, Communications: Pages 112-118, Freedom of Speech: Pages 133-171 . This book examines the Social, Legal, and Ethical issues related to Computing Technologies.


  • STUDY ITGS pages 290-308 and the content posted on the class and global Wikis for topic 2.6 (links attached).
  • After studying the resources identified above, create a new GDoc named 2.6A Your Last Name and complete the following (Please ensure that you continue to cite all sources appropriately):
    • EXPLAIN how might filtering of the Internet -- either overtly or covertly can affect our understanding of information and the world around us. [6 marks]
    • DESCRIBE two ways how we could know if our Internet access was filtered? [4 marks]
    • IDENTIFY the names and sources of TWO recent articles or videos that are DIRECTLY related to the learning goals identified above in the 2.6A Your Last Name GDoc. [4 marks possible].
    • TAG the URL for each source IDENTIFIED in #3 to the HHS ITGS Diigo group with the 2.6_pol_gov tag [8 marks possible]

2.6A Marking Scheme:
EXPLAIN filtering of Internet: 6/6
DESCRIBE two ways how we could know if our Internet access was filtered: 4/4
IDENTIFY the names and sources of TWO recent articles or videos DIRECTLY related to 2.6 learning goals: 2/2
TAG URLs for each source to the HHS ITGS Diigo Group: 8/8
Total Marks POSSIBLE: 20/20

Imagine that you are managing a campaign for a presidential candidate. On a piece of notebook paper EXPLAIN which technologies you would choose to use on your campaign. EXPLAIN technologies you would NOT decide to use and why? Circle ITGS Key terms [12 Marks]

Watch PBS Frontline: The Digital Campaign

  • STUDY ITGS pages 294-301.
  • TAG TWO recent news articles related to the politician's use of data mining and social media to the HHSITGS Diigo Group [8 marks] . Use the 2.6_pol_gov tag and share to the HHS ITGS Diigo Group. Be Prepared to present and DISCUSS the articles you tagged during class.
  • Study 2.6 Key Terms (Quizlet Widget Posted to 2.6 page of HHS ITGS Wiki).


STUDY the ITGS KT used in the the Military Use of IT section from ITGS Chapter 14: Politics and Government (pages 302-305).
TAG TWO recent news articles related to the military's use of emerging technologies to the HHSITGS Diigo Group [8 marks] . Use the 2.6_military tag. Prepared to present and DISCUSS the articles you tagged during class.

Sign in to Google Drive. Open the 2.6D template. Rename as 2.6D Your last name and complete 2.6D as directed. Submit via Edmodo (2.6D). [24 marks]

Research Biometric / E-passports and review page 293 (ITGS). Label a piece of notebook paper with your first and last name and Biometrics/E-passports at the top.
DESCRIBE three technologies governments are currently implementing in E-passports. Use bullet points and ITGS terminology appropriately. [6 marks].

Click here to access the 2.6E template.
Tag ONE article 2.6_military that meets ALL of the following criteria:
The main focus of the article is a NEGATIVE impact on a stakeholder from the use of an IT system. If the main focus the benefits of an IT system - then REJECT the article.
  • The topic must relate to 2.6 Military use of IT and be from a reliable source.
  • Is there a clear issue which can EASILY be identified?
  • Can the stakeholder(s) be EASILY identified?
  • Can the IT system be broken down into a series of steps by students and is there sufficient information about the IT system to guide other students?
  • Is there sufficient scope in the article to discuss further impacts, both POSITIVE and NEGATIVE, for Criterion C?
  • Are there viable solutions to the problem?
  • Is there a suitable graphic that could be included to clarify the technology?
  • Do not tag articles that simply address a new technology and describe it interviews, blogs, news releases on company sites (select only news articles).
One tagged article from the 2.6_military group will be chosen for the 2.6 Paper 2 Style Assessment. We will begin working on the 2.6 Paper 2 Style Assessment during class next week.

2.6F Paper 2 Style Assessment
READ the attached article titled "Surveillance by FBI's fleet of spy planes raises privacy questions | COMPUTER WORLD | 06.03.2015".

Complete the Paper 2 Style Assessment for the article on the document provided during class.
[100 marks]
  • You may use notes and resources for this assignment on your own (no group work / partners, etc.).
  • Circle ITGS Key Terms.
  • Cite sources appropriately.
Article: Surveillance by FBI's fleet of spy planes raises privacy questions | COMPUTER WORLD | 06.03.2015
Tips for being successful on Paper 2 (article triangle analysis) style assessments

2.6G Key Terms Test
Key Terms Test

ITGS Key Terms

Quiz created by Jacob Coscarelly with GoConqr