SlideShare a Scribd company logo
A New Paradigm  In Education INFORMATION Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya COMMUNICATION TECHNOLOGY AND 1
6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Review for last topic ,[object Object],[object Object],[object Object],2
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya i. What is computer ethic 3
[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya ii. Computer Ethics 4
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iii. Computer Law 5
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iii. Differences between computer e thic and law ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],6
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iv. Intellectual Property Rights 7
[object Object],[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya v. Intellectual Property Protection 8
[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Homework / Group work 9
A New Paradigm  In Education Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Let continue … our lesson for today ,[object Object],[object Object],[object Object],10

More Related Content

What's hot

Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technology
Haider Ali Malik
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
Chano Alfornon
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
Martin Jon Barnachia
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
Maricrs Alfarö
 
ICT Presentation - Std 10th C
ICT Presentation - Std 10th CICT Presentation - Std 10th C
ICT Presentation - Std 10th CKrupesh Shah
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpointMOE
 
Introduction of ICT and legal research :
Introduction of ICT and legal research :Introduction of ICT and legal research :
Introduction of ICT and legal research :
Bharati Vidyapeeth New Law College,Pune
 
La3 Intranet
La3 IntranetLa3 Intranet
La3 IntranetCma Mohd
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetMiz Malinz
 
Ch 2 internet aplications1
Ch 2 internet aplications1Ch 2 internet aplications1
Ch 2 internet aplications1
CANOSSAMAHIM
 
Ochedikwu onche cv
Ochedikwu onche cvOchedikwu onche cv
Ochedikwu onche cv
Rhythex Consulting
 
Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)
John Bosco Javellana, MAEd.
 
ICT & Legal Research
ICT  & Legal ResearchICT  & Legal Research
ICT & Legal Research
amanlodha5
 
Basics of information technology
Basics of information technologyBasics of information technology
Basics of information technology
Aakash software cell Gujrat.
 

What's hot (18)

Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technology
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
 
ICT Presentation - Std 10th C
ICT Presentation - Std 10th CICT Presentation - Std 10th C
ICT Presentation - Std 10th C
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
 
Introduction of ICT and legal research :
Introduction of ICT and legal research :Introduction of ICT and legal research :
Introduction of ICT and legal research :
 
La3 Intranet
La3 IntranetLa3 Intranet
La3 Intranet
 
Ipt
IptIpt
Ipt
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Module 1 : Introduction to Internet
Module 1 : Introduction to Internet Module 1 : Introduction to Internet
Module 1 : Introduction to Internet
 
Ch 2 internet aplications1
Ch 2 internet aplications1Ch 2 internet aplications1
Ch 2 internet aplications1
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Ochedikwu onche cv
Ochedikwu onche cvOchedikwu onche cv
Ochedikwu onche cv
 
Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)
 
Prof cvochedikwu
Prof cvochedikwuProf cvochedikwu
Prof cvochedikwu
 
ICT & Legal Research
ICT  & Legal ResearchICT  & Legal Research
ICT & Legal Research
 
Basics of information technology
Basics of information technologyBasics of information technology
Basics of information technology
 

Viewers also liked

Max Hachenburg
Max HachenburgMax Hachenburg
Max HachenburgMsSchool
 
PresentacióN Tema IX
PresentacióN Tema  IXPresentacióN Tema  IX
PresentacióN Tema IX
mivicacesan
 
Visie Nieuwe Media Saxion 27 Mei 2008
Visie Nieuwe Media Saxion 27 Mei 2008Visie Nieuwe Media Saxion 27 Mei 2008
Visie Nieuwe Media Saxion 27 Mei 2008
Saxion, University of Applied Sciences
 
Urok tolerantnosti
Urok tolerantnostiUrok tolerantnosti
Urok tolerantnostiritari68
 
Social Media Class Baarn - 151112
Social Media Class Baarn - 151112Social Media Class Baarn - 151112
Social Media Class Baarn - 151112
Peter Wiegman
 
Web 2.0 Session introduction
Web 2.0 Session introductionWeb 2.0 Session introduction
Web 2.0 Session introduction
Cindy Kendall
 
Why Gerund
Why GerundWhy Gerund
Why Gerund
gerunddev
 
Florida Keys Sales Mission Presentation June 2007[1]
Florida  Keys    Sales  Mission  Presentation  June 2007[1]Florida  Keys    Sales  Mission  Presentation  June 2007[1]
Florida Keys Sales Mission Presentation June 2007[1]
guest4a1b1c
 
La2 Motherboard
La2 MotherboardLa2 Motherboard
La2 MotherboardCma Mohd
 
KM Postcards
KM PostcardsKM Postcards
KM Postcards
MattthewParsons
 
Martin karlssons vykortssamling st olof
Martin karlssons vykortssamling   st olofMartin karlssons vykortssamling   st olof
Martin karlssons vykortssamling st olofhembygdsigtuna
 
WWF Advertising
WWF AdvertisingWWF Advertising
WWF Advertising
Slim Hmaied
 
Key to success
Key to successKey to success
Key to success
Neelanjan Bhattacharyya
 
Lou tulga's president obama's foreclosure relief program outline 2012
Lou tulga's president obama's  foreclosure relief program outline 2012Lou tulga's president obama's  foreclosure relief program outline 2012
Lou tulga's president obama's foreclosure relief program outline 2012
Professional Education Services
 
Optimalizace datového a hlasového řešení
Optimalizace datového a hlasového řešeníOptimalizace datového a hlasového řešení
Optimalizace datového a hlasového řešení
Equica
 

Viewers also liked (20)

Max Hachenburg
Max HachenburgMax Hachenburg
Max Hachenburg
 
PresentacióN Tema IX
PresentacióN Tema  IXPresentacióN Tema  IX
PresentacióN Tema IX
 
Dialog
DialogDialog
Dialog
 
Visie Nieuwe Media Saxion 27 Mei 2008
Visie Nieuwe Media Saxion 27 Mei 2008Visie Nieuwe Media Saxion 27 Mei 2008
Visie Nieuwe Media Saxion 27 Mei 2008
 
Urok tolerantnosti
Urok tolerantnostiUrok tolerantnosti
Urok tolerantnosti
 
Social Media Class Baarn - 151112
Social Media Class Baarn - 151112Social Media Class Baarn - 151112
Social Media Class Baarn - 151112
 
Handpaintings
HandpaintingsHandpaintings
Handpaintings
 
Web 2.0 Session introduction
Web 2.0 Session introductionWeb 2.0 Session introduction
Web 2.0 Session introduction
 
Why Gerund
Why GerundWhy Gerund
Why Gerund
 
Software1
Software1Software1
Software1
 
Florida Keys Sales Mission Presentation June 2007[1]
Florida  Keys    Sales  Mission  Presentation  June 2007[1]Florida  Keys    Sales  Mission  Presentation  June 2007[1]
Florida Keys Sales Mission Presentation June 2007[1]
 
La2 Motherboard
La2 MotherboardLa2 Motherboard
La2 Motherboard
 
KM Postcards
KM PostcardsKM Postcards
KM Postcards
 
Martin karlssons vykortssamling st olof
Martin karlssons vykortssamling   st olofMartin karlssons vykortssamling   st olof
Martin karlssons vykortssamling st olof
 
WWF Advertising
WWF AdvertisingWWF Advertising
WWF Advertising
 
Key to success
Key to successKey to success
Key to success
 
Kavir
KavirKavir
Kavir
 
Lou tulga's president obama's foreclosure relief program outline 2012
Lou tulga's president obama's  foreclosure relief program outline 2012Lou tulga's president obama's  foreclosure relief program outline 2012
Lou tulga's president obama's foreclosure relief program outline 2012
 
Flex mobile for JUG
Flex mobile for JUGFlex mobile for JUG
Flex mobile for JUG
 
Optimalizace datového a hlasového řešení
Optimalizace datového a hlasového řešeníOptimalizace datového a hlasového řešení
Optimalizace datového a hlasového řešení
 

Similar to La1 Comp Ethic

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
MohammedAish
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
university of education,Lahore
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
Saqib Raza
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Mukesh Tekwani
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
Neil Witt
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
Fatin Izzaty
 
Course Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxCourse Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docx
ReneeRosePaunil1
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesChantial
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
sr24production
 
EC358-CH8.ppt
EC358-CH8.pptEC358-CH8.ppt
EC358-CH8.ppt
Deepal Shah
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)wtidwell
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
ssuseraaf866
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
BestMan28
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
pixvilx
 
LLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - SussexLLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - SussexChris Marsden
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
ClaudeDex
 

Similar to La1 Comp Ethic (20)

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
Gr 3 ethical implication of it
Gr 3   ethical implication of itGr 3   ethical implication of it
Gr 3 ethical implication of it
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Course Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxCourse Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docx
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
EC358-CH8.ppt
EC358-CH8.pptEC358-CH8.ppt
EC358-CH8.ppt
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
LLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - SussexLLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - Sussex
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 

More from Cma Mohd

La 5 Programming2
La 5   Programming2La 5   Programming2
La 5 Programming2Cma Mohd
 
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1Cma Mohd
 
La5 Programming688
La5 Programming688La5 Programming688
La5 Programming688Cma Mohd
 
La5 Program Phases
La5 Program PhasesLa5 Program Phases
La5 Program PhasesCma Mohd
 
La5 Basicelement
La5 BasicelementLa5 Basicelement
La5 BasicelementCma Mohd
 
La 5 Pl Translator
La 5   Pl TranslatorLa 5   Pl Translator
La 5 Pl TranslatorCma Mohd
 
LA5_PL Approach
LA5_PL ApproachLA5_PL Approach
LA5_PL ApproachCma Mohd
 
LA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesLA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesCma Mohd
 
Summary of LA5
Summary of LA5Summary of LA5
Summary of LA5Cma Mohd
 
Basic Programming Concept
Basic Programming ConceptBasic Programming Concept
Basic Programming Concept
Cma Mohd
 
hardware, editing software, authoring tools
hardware, editing software, authoring toolshardware, editing software, authoring tools
hardware, editing software, authoring toolsCma Mohd
 
introduction of ict
introduction of ictintroduction of ict
introduction of ict
Cma Mohd
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia ElementsCma Mohd
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia ElementsCma Mohd
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
Cma Mohd
 
La3 Mediumnetwork
La3 MediumnetworkLa3 Mediumnetwork
La3 MediumnetworkCma Mohd
 
La3 Hardware
La3 HardwareLa3 Hardware
La3 HardwareCma Mohd
 
Wireless Transmission
Wireless TransmissionWireless Transmission
Wireless TransmissionCma Mohd
 

More from Cma Mohd (20)

La 5 Programming2
La 5   Programming2La 5   Programming2
La 5 Programming2
 
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1
 
La5 Quiz
La5 QuizLa5 Quiz
La5 Quiz
 
La5 Programming688
La5 Programming688La5 Programming688
La5 Programming688
 
La5 Program Phases
La5 Program PhasesLa5 Program Phases
La5 Program Phases
 
La5 Basicelement
La5 BasicelementLa5 Basicelement
La5 Basicelement
 
La 5 Pl Translator
La 5   Pl TranslatorLa 5   Pl Translator
La 5 Pl Translator
 
LA5_PL Approach
LA5_PL ApproachLA5_PL Approach
LA5_PL Approach
 
LA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesLA5_Generation of Programming Languages
LA5_Generation of Programming Languages
 
Summary of LA5
Summary of LA5Summary of LA5
Summary of LA5
 
Basic Programming Concept
Basic Programming ConceptBasic Programming Concept
Basic Programming Concept
 
hardware, editing software, authoring tools
hardware, editing software, authoring toolshardware, editing software, authoring tools
hardware, editing software, authoring tools
 
introduction of ict
introduction of ictintroduction of ict
introduction of ict
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
La3 Mediumnetwork
La3 MediumnetworkLa3 Mediumnetwork
La3 Mediumnetwork
 
Nos
NosNos
Nos
 
La3 Hardware
La3 HardwareLa3 Hardware
La3 Hardware
 
Wireless Transmission
Wireless TransmissionWireless Transmission
Wireless Transmission
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

La1 Comp Ethic

  • 1. A New Paradigm In Education INFORMATION Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya COMMUNICATION TECHNOLOGY AND 1
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.