0% found this document useful (0 votes)
32 views55 pages

Learning Module in IT Era

Module

Uploaded by

modestoalmajean
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views55 pages

Learning Module in IT Era

Module

Uploaded by

modestoalmajean
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Republic of the Philippines

Romblon State University


Romblon, Philippines

_____________________________________________________________________________________
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Lesson 1: Introduction to Information and Communication Technology
Objectives
Lesson 1.1.: Information and Communication Technology

Lesson 2: The Web and the Internet


Objectives
Lesson 2.1.: The Web
Lesson 2.2.: The Internet

Lesson 3: The Netiquette and the Computer Ethics


Objectives
Lesson 3.1.: Netiquette
Lesson 3.2.: Cybercrimes
Lesson 3.3.: Internet Threats

Lesson 4: Digital Technology and Social Change


Objectives
Lesson 4.1.: Introduction to the Digital Age

Lesson 5: IT Culture and the Society


Objectives
Lesson 5.1.: Internet of Things
Lesson 5.2.: Current Trends and Emerging Technologies
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

LESSON 1: INTRODUCTION TO
INFORMATION AND COMMUNICATION
TECHNOLOGY
Overview
The quickening pace of evolution in technology is very evident in this era. It seems
that it is progressing faster than ever. From year to year, the evolution of technology is
one of staggering promise and opportunity--as well as uncertainty. Basically, technology
has been around before, and as long as there are people, information technology will
be there also because there were always ways of communicating through technology
available at that point in time. The future may be unknown, but digital advancement
continues to reshape our world in ways that encourage people to form new habits, find
new ways to work together, and become better human beings. And, in most cases, these
changes translate into a range of opportunities and disruptions across every industry.
Humans have always been quick to adapt technologies for better and faster
communication.

Objectives
After successful completion of this module, the student can be able to;
• Demonstrate a sense of readiness for the upcoming semester;
• Identify their learning outcomes and expectations for the course;
• Recognize their capacity to create new understandings from reflecting on the
course; • Know the role and importance of ICT.

Lesson 1.1: Information and Communication


Technology
History of ICT
ICT, or information and communications technology (or technologies), is the
infrastructure and components that enable modern computing.

Although there is no single, universal definition of ICT, the term is generally


accepted to mean all devices, networking components, applications and systems that
combined allow people and organizations (i.e., businesses, nonprofit agencies,
governments and criminal enterprises) to interact in the digital world.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

Uses of ICT In Our Daily Lives


Communication
We all know that ICT take a major role for us by means of communicating, way
back in the past our parents use to make letter and send it via post mail. But now with
the help of ICT it is easier to communicate with our love ones. We can use cellular phones
that design for communicating with other people even they are miles away far from you.
Nowadays people are in touch with the help of ICT. Through chatting, E-mail, voice mail
and social networking people communicate with each other. It is the cheapest means
of communication.

ICT allows students to monitor and manage their own learning, think critically and
creatively, solve simulated real-world problems, work collaboratively, engage in ethical
decision-making, and adopt a global perspective towards issues and ideas. It also
provides students from remote areas access to expert teachers and learning resources,
and gives administrators and policy makers the data and expertise they need to work
more efficiently.

Job Opportunities

In the employment sector, ICT enables organizations to operate more efficiently,


so employing staff with ICT skills is vital to the smooth running of any business. Being able
to use ICT systems effectively allows employees more time to concentrate on areas of
their job role that require soft skills.

For example, many pharmacies use robot technology to assist with picking
prescribed drugs. This allows highly trained pharmaceutical staff to focus on jobs requiring
human intelligence and interaction, such as dispensing and checking medication.

Nowadays, employers expect their staff to have basic ICT skills. This expectation
even applies to job roles where ICT skills may not have been an essential requirement in
the past.

Nowadays, finding a job is different, you can just use your smart phone, laptop,
desktop or any gadgets that is available in the comfort of your home.

Education
Information and Communications Technology (ICT) can impact student learning
when teachers are digitally literate and understand how to integrate it into curriculum.

Schools use a diverse set of ICT tools to communicate, create, disseminate, store,
and manage information.(6) In some contexts, ICT has also become integral to the
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
teachinglearning interaction, through such approaches as replacing chalkboards with
interactive digital whiteboards, using students’ own smartphones or other devices for
learning during class time, and the “flipped classroom” model where students watch
lectures at home on the computer and use classroom time for more interactive exercises.

When teachers are digitally literate and trained to use ICT, these approaches can
lead to higher order thinking skills, provide creative and individualized options for students
to express their understandings, and leave students better prepared to deal with ongoing
technological change in society and the workplace.

Socializing
Social media has changed the world. The rapid and vast adoption of these
technologies is changing how we find partners, how we access information from the
news, and how we organize to demand political change.

The internet and social media provide young people with a range of benefits, and
opportunities to empower themselves in a variety of ways. Young people can maintain
social connections and support networks that otherwise wouldn't be possible and can
access more information than ever before. The communities and social interactions
young people form online can be invaluable for bolstering and developing young
people's self-confidence and social skills.

As the ICT has become ubiquitous, faster and increasingly accessible to non-
technical communities, social networking and collaborative services have grown rapidly
enabling people to communicate and share interest in many more ways, sites like
Facebook, Twitter LinkedIn You tube, Flicker, second life delicious blogs wiki’s and many
more let people of all ages rapidly share their interest of the movement without others
everywhere. But Facebook seems to be the leading areas of where people
communicate and share their opinions. What a change! “Nothing is permanent, but
change” (As Heraditus in the 4thcentury BC). Internet can be seen as the international
networks of interconnection of computer networks, the main purpose for the institution of
internet are quest for information i.e. browsing, electronic mail, knew groups fill transfer
and access and use of other computer. Socialization can be seen as a process by which
a child adapts a behavior to be an effective member of the society, which can only be
achieved through learning or education.

Impact of ICT in the Society

Positive impacts of Information and Communication Technology

• Access to information: Increase in access to information and services that has


accompanied the growth of the Internet. Some of the positive aspects of this
increased access are better, and often cheaper, communications, such as VoIP
phone and Instant Messaging.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
• Improved access to education, e.g. distance learning and online tutorials. New
ways of learning, e.g. interactive multi-media and virtual reality.
• New tools, new opportunities: ICT gives access to new tools that did not
previously exist: digital cameras, photo-editing software and high quality printers,
screen magnification or screen reading software enables partially sighted or blind
people to work with ordinary text rather than Braille.
• Communication: Cost savings by using e.g. VoIP instead of normal telephone,
email / messaging instead of post, video conferencing instead of traveling to
meetings, e-commerce web sites instead of sales catalogues. Access to larger,
even worldwide, markets.
• Information management: Data mining of customer information to produce lists
for targeted advertising. Improved stock control, resulting in less wastage, better
cash flow, etc.
• Security: ICT solves or reduces some security problems, e.g. Encryption methods
can keep data safe from unauthorized people, both while it is being stored or
while it is being sent electronically.
• ICT allows people to participate in a wider, even worldwide, society.
• Distance learning: students can access teaching materials from all over the
world.
• ICT facilitates the ability to perform ‘impossible’ experiments’ by using
simulations.
• Creation of new more interesting jobs. Examples would be systems analysts,
programmers and software engineers, as well as help desk operators and trainers.

Negative impacts of Information and Communication Technology

• Job loss: Manual operations being replaced by automation. e.g. robots


replacing people on an assembly line. Job export. e.g. Data processing work
being sent to other countries where operating costs are lower. Multiple workers
being replaced by a smaller number who are able to do the same amount of
work. e.g. A worker on a supermarket checkout can serve more customers per
hour if a bar-code scanner linked to a computerized till is used to detect goods
instead of the worker having to enter the item and price manually
• Reduced personal interaction: Most people need some form of social
interaction in their daily lives and if they do not get the chance to meet and talk
with other people they may feel isolated and unhappy.
• Reduced physical activity: This can lead to health problems such as obesity,
heart disease, and diabetes.
• Cost: A lot of ICT hardware and software is expensive, both to purchase and to
maintain. An ICT system usually requires specialist staff to run it and there is also the
challenge of keeping up with ever-changing technology.
• Competition: this is usually thought of as being a good thing, but for some
organizations being exposed to greater competition can be a problem. If the
organization is competing for customers, donations, or other means of funding
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
nationally or even internationally, they may lose out to other organizations that
can offer the same service for less money.

References

• W. Samuel, S. G. Ajumo, E. C. Anderson and S. Worgu (2016). ICT As A Change


Angent For Socialization and Social Engineering. IOSR Journal of Computer
Engineering (IOSRJCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4,
Ver. II
• https://www.digitalistmag.com/cio-knowledge/2019/02/26/evolution-of-
technologycontinues-what-is-next-in-2019-06196611/
• https://bit.ly/30IZ4FO
• https://ailynvlla.home.blog/2019/03/04/how-ict-affect-our-daily-life/
• https://bit.ly/32Vlpm6
• https://www.wikijob.co.uk/content/application-advice/job-
applications/what-are-ict-skills
• https://bit.ly/2BuODwV
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

LESSON 2: THE WEB AND THE


INTERNET
Overview
Internet is defined as an information superhighway, to access information over the
web. However, it can be defined in many ways, internet is a world-wide global system of
interconnected computer networks.

Objectives

At the end of this lesson, the student should be able to:


• Explore the current breakthrough technologies and disruptive innovations that
have emerged over the past few years.
• Identify and analyze various emerging technologies.
• Explore the evolution of the internet.
• Identify and understand the different uses of internet in today’s generation.
• Discuss the fundamental terms and definitions used in the internet.

Lesson 2.1: The Web


The Web (World Wide Web) consists of information organized into Web pages
containing text and graphic images. The world wide web is larger collection of
interconnected documents or content. It contains hypertext links, or highlighted
keywords and images that lead to related information. A collection of linked Web pages
that has a common theme or focus is called a Web site. The main page that all of the
pages on a particular Web site are organized around and link back to is called the site’s
home page. Sir Timothy John Berners-Lee OM KBE FRS FREng FRSA FBCS, also known as
TimBL, is an English engineer and computer scientist best known as the inventor of the
World Wide Web. He is a Professorial Fellow of Computer Science at the University of
Oxford and a professor at the Massachusetts Institute of Technology.

A. Web 1.0 (Read Only Static Web)


It is an old internet that only allows people to read from the internet. First stage
worldwide linking web pages and hyperlink. Web is use as “information portal”. It uses
table to positions and align elements on page.

• Most read only web. If focused on company’s home pages.


• Dividing the World Wide Web into usable directories
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
• It means web is use as “Information Portal”
• It started with the simple idea “put content together”

Example of Web 1.0


• Mp3.com
• Home Page
• Directories
• Page Views
• HTML/Portals.

Disadvantages
• Read only web
• Limited user interaction
• Lack of standards

B. Web 2.0 (Read-write interactive web)


A term used to describe a new generation of Web services and applications with
an increasing emphasis on human collaboration.

• It is a platform that gives users the possibility (liberty) to control their data.
• This is about user-generated content and the read-write web.
• People are consuming as well as contributing information through blogs or sites.
• Allows the user to interact with the page known as DYNAMIC PAGE; instead of
just reading a page, the user may be able to comment or create a user account.
Dynamic page refers to the web pages that are affected by user input or
preference.
• Is focused on the ability for people to collaborate and share information online
via social media, blogging and Web-based communities.

Example of Web 2.0 are the following:

A. Social Networking - is the use of Internet-based social media sites to stay


connected with friends, family, colleagues, customers, or clients. Social networking
can have a social purpose, a business purpose, or both, through sites such as:

Example:
Facebook Pinterest
Twitter Tumblr
LinkedIn Instagram
Google+ Page

B. Blogs - is a discussion or informational website published on the world wide web


consisting of discrete, often informal diary-style text entries (posts). Posts are
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
typically displayed in reverse chronological order, so that the most recent post
appears first, at the top of the web page.
Example
Wordpress Blogger Tumbler

C. Wikis - is a hypertext publication collaboratively edited and managed by its


own audience directly using a web browser. A typical wiki contains multiple pages
for the subjects or scope of the project and may be either open to the public or
limited to use within an organization for maintaining its internal knowledge base.

Example:
Wikipedia Wikivoyage
Wikibooks Wikidata
Wikiversity Wikinews
Commons Wikispecies
Wiktionary MediaWiki
Wikiquote

D. Video Sharing Sites - a website that lets people upload and share their video
clips with the public at large or to invited guests.

Example:
Youtube Veoh
Facebook Dailymotion
LinkedIn VimeoPRO
Flickr Myspace.com
Photobucket Metacafe
Twitter

Key Features of Web 2.0:

• Folksonomy – allows users to categorize and classify/arrange information using freely


chosen keywords (e.g. tagging).
• Rich User Interface – content is dynamic and is responsive to user’s input. An example
would be a website that shows local content.
• User Participation – the owner of website is not the only one who is able to put content.
Others are able to place a content on their own by means of comments, reviews, and
evaluation.
• Long Tail – services are offered on demand rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that charges you for the amount of time you
spent on Internet or a data plan that charges you for the amount of bandwidth you used.

C. Web 3.0: (Read-write intelligent web)


• Suggested name by John Markoff of the New York Times for the third generation
of the web.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
• In this generation, all the application on web or mobile will be upgraded with
more features. It applies same principles as Web 2.0: two-way interaction.
• Web 3.0 will be more connected, open, and intelligent, with semantic web
technologies, distributed databases, natural language processing, machine
learning, machine reasoning and autonomous agents.
• Semantic Web - provides a framework that allows data to be shared and reuse
to deliver web content specifically targeting the user.
• It is a web of data.
• Changing the web into a language that can be read and categorized by the
system rather than humans.

Types of websites:
• eCommerce Website
is a website people can directly buy products from you’ve probably
used a number of eCommerce websites before, most big brands and plenty of
smaller ones have one. Any website that includes a shopping cart and a way for
you to provide credit card information to make a purchase falls into this
category.

• Business Website
is any website that’s devoted to representing a specific business. It
should be branded like the business (the same logo and positioning) and
communicate the types of products and/or services the business offers.

• Entertainment Website
If you think about your internet browsing habits, you can probably think of
a few websites that you visit purely for entertainment purposes.

• Portfolio Website
are sites devoted to showing examples of past work. Service providers who
want to show potential clients the quality of the work they provide can use a
portfolio website to collect some of the best samples of past work they’ve done.
This type of website is simpler to build than a business website and more focused
on a particular task: collecting work samples.

• Media Website
collect news stories or other reporting. There’s some overlap here with
entertainment websites, but media websites are more likely to include reported
pieces in addition to or instead of content meant purely for entertainment.

• Brochure Website
are a simplified form of business websites. For businesses that know they
need an online presence, but don’t want to invest a lot into it (maybe you’re
confident you’ll continue to get most of your business from other sources), a
simple brochure site that includes just a few pages that lay out the basics of
what you do and provide contact information may be enough for you.
• Nonprofit Website
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
In the same way that businesses need websites to be their online presence,
nonprofits do as well. A nonprofit website is the easiest way for many potential
donors to make donations and will be the first place many people look to learn
more about a nonprofit and determine if they want to support it.

• Educational Website
The websites of educational institutions and those offering online courses
fall into the category of educational websites. These websites have the primary
goal of either providing educational materials to visitors or providing information
on an educational institution to them.

• Infopreneur Website
websites overlap a bit with business and eCommerce websites, but they
represent a unique type of online business. Infopreneurs create and sell
information products. That could be in the form of courses, tutorials, videos or
eBooks.

• Personal Website
Not all websites exist to make money in some way or another. Many people
find value in creating personal websites to put their own thoughts out into the
world. This category includes personal blogs, vlogs, and photo diaries people
share with the world.

• Web Portal
are often websites designed for internal purposes at a business,
organization, or institution. They collect information in different formats from
different sources into one place to make all relevant information accessible to the
people who need to see it. They often involve a login and personalized views for
different users that ensure the information that’s accessible is most useful to their
particular needs.

• Wiki or Community Forum Website


Most people are familiar with wikis through the most famous example of
one out there: Wikipedia. But wikis can be created on pretty much any subject
you can imagine. A wiki is any website where various users are able to collaborate
on content and all make their own tweaks and changes as they see fit. There are
wikis for fan communities, for business resources, and for collecting valuable
information sources.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

Lesson 2.2: The Internet


The Internet or “net” (network of network) is the largest computer network in the
world that connects billions of computer user. The word internet comes from combination
between “interconnection” and “network”. Network is a collection of computers and
devices connected via communication channels and transmission media allow to share
resources (hardware, software, data, information). Generally, nobody owns the internet.

A. Brief History of Internet


ARPA – Advanced Research Project Agency January 2, 1969 – started an
experimental computer network. Concept – No server, but equal
importance/participation to every computer in the network. Even if, one or two node
destroyed that will now affect the network. In 1982 the word internet started. 1986 – First
“ free net” created in Case Western Reserve University 1991: US government allowed
business agencies to connect to internet. Now all people can connect to the internet
and improve their life and work quality. The internet support various aspects in our life.
Vinton Gray Cerf ForMemRS is an American Internet pioneer and is recognized as one of
"the fathers of the Internet", sharing this title with TCP/IP co-developer Bob Kahn.

B. Major Components of the Internet

1. Servers – is a computer program that provides service to another computer program


and it’s user.

Types of Servers
Application Server – a program in computer that provides the business
logic for an application program.
Web Server – a computer program that serves requested HTML pages or
files.
Proxy Server – is a software that acts as an intermediary between an
endpoint device, such as computer and another server from which a user
is requesting.
Mail Server – is an application that receives incoming e-mail from local
users and remote senders and forward outgoing e-mail for delivery
File Server – is a computer responsible for central storage and
management of data files so that other computer on the same
network can access them.
Policy Server – is a security component of a policy – based network that
provides authorization services and facilities tracking and control of files.

2. IP Address (Internet Protocol) – is a numerical label assigned to each device. This


provides identity to a network device.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
3. Browser – is an application program that provides a way to look information on the
web.

Example of browsers:
Google Chrome, Safari, Internet Explorer, Opera, Mozilla Firefox

4. Domain Name System (DNS) – is the phonebook of internet. We access information


online through domain names.

Example of DNS: www.facebook.com, www.pup.edu.ph,www.academia.edu

Name Entity
.com commercial
.org organization
.net network
.edu education
.gov National and State Government Agencies
.ph Philippines
.au Australia

5. Internet Service Provide (ISP) – is an organization that provides services for accessing,
using or participating in the internet.

Two types of ISP:


National ISP – provided internet access to a specific geographic area.
Regional ISP – business that provides internet access in cities and towns
nationwide.
Example of ISP: Sky Broadband, PLDT, Converge

C. Uses of Internet
• Look for information
• School works, jobs, and home purposes
• Send and receive electronic mail
• Video teleconferencing (video call, video chat)
• Buy and sell product
• Social networking
• Watch & post videos
• Games
• Take college courses
• Monitor home while away
• Financial transactions
• Download music and movies

D. Internet Terms and Definition


• Internet - A global network of thousands of computer networks linked by data
lines and wireless systems.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
• Web – a collection of billions of webpages that you can view with a web browser
• Email – the most common method of sending and receiving messages online
• Social media – websites and apps that allow people to share comments, photos,
and videos
• Online gaming – games that allow people to play with and against each other
over the Internet
• Software updates – operating system and application updates can typically
downloaded from the Internet
• HTML - Hypertext Markup Language is a coding language used to tell a browser
how to place pictures, text, multimedia and links to create a web page. When a
user clicks on a link within a web page, that link, which is coded with HTML, links
the user to a specific linked web page.
• URL - Uniform Resource Locator is a web address used to connect to a remote
resource on the world wide web.
• Bit - is a single digit in the binary numbering system (base 2). For example: 1 is a
bit or 0 is a bit.
• Byte - generally consists of eight bits.
• Upload - To upload is to transfer data from your computer to another computer.
• Download - To download is to transfer data from another computer to your
computer.
• HTTP - is the acronym for Hypertext Transfer Protocol, the data communication
standard of web pages. When a web page has this prefix, the links, text, and
pictures should work correctly in a web browser.
• HTTPS - is the acronym for Hypertext Transfer Protocol Secure. This indicates that
the web page has a special layer of encryption added to hide your personal
information and passwords from others.
• Router or router-modem combination is the hardware device that acts as the
traffic cop for network signals arriving at your home or business from your ISP. A
router can be wired or wireless or both.
• Encryption - is the mathematical scrambling of data so that it is hidden from
eavesdroppers. Encryption uses complex math formulas to turn private data into
meaningless gobbledygook that only trusted readers can unscramble.
• Web Bot - A term that applies to programs/applets (macros and intelligent
agents) used on the Internet. Such bots perform a repetitive function, such as
posting messages to multiple newsgroups or doing searches for information.
• Search Engine - specialized software, such as Google and Yahoo, that lets www
browser users search for information on the web by using keywords, phrases.

Online Resources / Videos


• https://www.youtube.com/watch?v=J8hzJxb0rpc
• https://www.youtube.com/watch?v=x3c1ih2NJEg
• https://www.youtube.com/watch?v=Dxcc6ycZ73M
• https://www.youtube.com/watch?v=5o8CwafCxnU
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
References
• Abraham, R., Jas, F., Russell, W. (2005) The Web Empowerment Book: An
Introduction and Connection Guide to the Internet and the World-Wide Web.
Springer-Verlag New York
• Evolutionof the web retrieved from
https://www.slideshare.net/sububasistha/web-10-to-web30-evolution-of-the-
web-and-its-various-challenges
• Types of websites retrieved from https://www.hostgator.com/blog/popular-
types-websitescreate/
• Subhash Basishtha Web 1.0 to Web 3.0 – Evolution of the Web and its Various
Challenges. Retrieved from https://slideshare.net/sububasistha/web-10-to-
web-30-evolution-of-the-web-and-its-various-challenges
• What is internet Retrieved from
https://www.tutorialspoint.com/internet_technologies/internet_overview.htm
• Internet terms and definition Retrieved from
https://techterms.com/definition/internet
• Internet terms and definition Retrieved from
https://www.comentum.com/internet-terms.html
• Internet terms and definition Retrieved from https://www.lifewire.com/top-
internet-terms-forbeginners-2483381
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

LESSON 3: THE NETIQUETTE AND THE


COMPUTER ETHICS

Overview
The Netiquette and The Computer ethics discusses about the ethical issues in the
field of computer. May it be in online or practicing in professional.

Objectives
At the end of this module, you should be able to:
• Discuss the importance of being a responsible netizen by following the rules of
common courtesy online and the informal “rules of the road” of cyberspace.
• Discuss the difference between privacy and security.
• Explain various risks to internet privacy.

Lesson 3.1: Netiquette

What is Netiquette?
What is Netiquette? Simple stated, it’s network etiquette – that is the etiquette of
cyberspace and “etiquette” means the forms of required by good breeding or
prescribed by authority to be required in social or official life. In other words, netiquette is
a set of rules for behaving properly online.

Netiquette, or network etiquette, is concerned with the "proper" way to


communicate in an online environment. Consider the following "rules," adapted from
Virginia Shea's the Core Rules of Netiquette, whenever you communicate in the virtual
world.

When you use e-mail, instant messenger, video calls, or discussion boards to
communicate with others online, please be sure to follow the rules of professional online
communications known as netiquette. These rules will help you communicate with
instructors, classmates, and potential employers more effectively and will help prevent
misunderstandings.

REMEMBER THE GOLDEN RULE – Even though you may be interacting with a
computer screen, you are communicating with a real person who will react to
your message. Make a good impression - treat others with the same respect that
you would like to receive and avoid confrontational or offensive language.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

To help convey meaning when creating messages, it is sometimes acceptable to


include appropriate emoticon symbols, such as a smiley face :) However, for
professional communications these would be inappropriate.

AVOID SLANG, ACRONYMS, AND TEXT TALK – Communicating effectively in


college and business environments requires the use of correct terminology,
spelling, and grammar that can easily be understood. For example, use “your”
instead of “ur”.

AVOID “SCREAMING” IN TYPED MESSAGES – Typing an entire message using all


capital letters is known as “screaming”. It is distracting and generally frowned
upon in professional environments. It is better to draw emphasis to selected words
or phrases by: using italic or bold text; using a different color for text or background
color; or denoting emphasis using special characters (Example: **Important**).

PROOFREAD YOUR MESSAGES BEFORE SENDING THEM – Proofreading your


messages before you send them is a best practice for effective and efficient
communication. Strive to make your communications concise and free of any:
• Spelling and grammar errors
• Confusing terms or phrases that could be misunderstood
• Errors of omission, such as missing content or recipients
• Errors in accuracy of information

EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION WITH OTHERS ONLINE –


E-mail and chat messages that you send or receive are considered private and
should not be forwarded or copied to others without gaining the consent of all
involved participants. In general, messages posted to discussion boards and social
media sites can be read by the public. You may never know who might read or
share what you post. It is a good practice to always ask a post’s author for
permission before sharing a post with other parties.

• To protect your privacy and safety, do not share online any sensitive personal
information such as:
- Your home address or phone number
- Personal conversations
- Social plans, such as vacations
- Financial information
- Usernames, passwords, or hints
- Anything personal that you would not want shared by others over the
Internet

• If the material you share with others online came from another source, make
every effort to gain permission from the original author or copyright holder.
Copying someone else's work and passing it off as your own is plagiarism. It
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
damages your reputation and could subject you to serious academic and legal
consequences.

RESPECT DIVERSITY IN VIEWPOINTS - Be constructive and respectful when sharing


opinions, beliefs, and criticisms, or responding to those of others in the
conversation.

• When sharing a viewpoint that differs from someone else’s, it is a best practice
to first acknowledge the other person by briefly restating what he or she said, but
in your own words. This lets the person know that you are listening and trying to
understand them.

• When presenting an opinion or criticism, it is helpful to use phrases that identify


to whose point of view you are referring. If the opinion is yours, you can begin with
the phrase “In my experience” or “In my opinion”. If it is a viewpoint of someone
else, make sure you identify that in your message (Example: “According to Eric
Ericson,” or “The president believes”).

Ten Commandments of Computer Ethics


Rule 1: Remember the Human When communicating electronically, whether
through email, instant message, discussion post, text, or some other method,
practice the Golden Rule: Do unto others as you would have others do unto you.
Remember, your written words are read by real people, all deserving of respectful
communication. Before you press "send" or "submit," ask yourself, "Would I be okay
with this if someone else had written it?"

Rule 2: Adhere to the same standards of behavior online that you follow in real life
While it can be argued that standards of behavior may be different in the virtual
world, they certainly should not be lower. You should do your best to act within
the laws and ethical manners of society whenever you inhabit "cyberspace."
Would you behave rudely to someone face-toface? On most occasions, no.
Neither should you behave this way in the virtual world.

Rule 3: Know where you are in cyberspace "Netiquette varies from domain to
domain." (Shea, 1994) Depending on where you are in the virtual world, the same
written communication can be acceptable in one area, where it might be
considered inappropriateq in another. What you text to a friend may not be
appropriate in an email to a classmate or colleague. Can you think of another
example?

Rule 4: Respect other people's time and bandwidth Electronic communication


takes time: time to read and time in which to respond. Most people today lead
busy lives, just like you do, and don't have time to read or respond to frivolous
emails or discussion posts. As a virtual world communicator, it is your responsibility
to make sure that the time spent reading your words isn't wasted. Make your
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
written communication meaningful and to the point, without extraneous text or
superfluous graphics or attachments that may take forever to download.

Rule 5: Make yourself look good online writing.colostate.edu One of the best things
about the virtual world is the lack of judgment associated with your physical
appearance, sound of your voice, or the clothes you wear (unless you post a video
of yourself singing Karaoke in a clown outfit.) You will, however, be judged by the
quality of your writing, so keep the following tips in mind: Always check for spelling
and grammar errors Know what you're talking about and state it clearly Be
pleasant and polite

Rule 6: Share expert knowledge The Internet offers its users many benefits; one is
the ease in which information can be shared or accessed and in fact, this
"information sharing" capability is one of the reasons the Internet was founded. So,
in the spirit of the Internet's "founding fathers," share what you know! When you
post a question and receive intelligent answers, share the results with others. Are
you an expert at something? Post resources and references about your subject
matter. Recently expanded your knowledge about a subject that might be of
interest to others? Share that as well.

Rule 7: Help keep flame wars under control What is meant by "flaming" and "flame
wars?" "Flaming is what people do when they express a strongly held opinion
without holding back any emotion." (Shea, 1994). As an example, think of the kinds
of passionate comments you might read on a sports blog. While "flaming" is not
necessarily forbidden in virtual communication, "flame wars," when two or three
people exchange angry posts between one another, must be controlled or the
camaraderie of the group could be compromised. Don't feed the flames;
extinguish them by guiding the discussion back to a more productive direction.

Rule 8: Respect other people's privacy Depending on what you are reading in the
virtual world, be it an online class discussion forum, Facebook page, or an email,
you may be exposed to some private or personal information that needs to be
handled with care. Perhaps someone is sharing some medical news about a loved
one or discussing a situation at work. What do you think would happen if this
information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a
job? Just as you expect others to respect your privacy, so should you respect the
privacy of others. Be sure to err on the side of caution when deciding to discuss or
not to discuss virtual communication.

Rule 9: Don't abuse your power Just like in face-to-face situations, there are people
in cyberspace who have more "power" than others. They have more expertise in
technology or they have years of experience in a particular skill or subject matter.
Maybe it's you who possesses all of this knowledge and power! Just remember:
knowing more than others do or having more power than others may have does
not give you the right to take advantage of anyone. Think of Rule 1: Remember
the human.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Rule 10: Be forgiving of other people's mistakes Not everyone has the same
amount of experience working in the virtual world. And not everyone knows the
rules of netiquette. At some point, you will see a stupid question, read an
unnecessarily long response, or encounter misspelled words; when this happens,
practice kindness and forgiveness as you would hope someone would do if you
had committed the same offense. If it's a minor "offense," you might want to let it
slide. If you feel compelled to respond to a mistake, do so in a private email rather
than a public forum.

Lesson 3.2: Cybercrimes


What is Cyber?
It is the Characteristics of the culture of computers, information, technology and
virtual reality.

Cybercrime is defined as a crime in which a computer is the object of the crime


(hacking, phishing, spamming and child pornography) is used as a tool to commit
an offense.

Cybercriminals may use computer technology to access personal


information, business trade secrets or use the internet for exploitative or malicious
purposes.

Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the
Philippines approved on September 12, 2012 which aims to address legal issues
concerning online interactions and internet.

Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting
individual personal information.

COMMON FORMS OF CYBERCRIMES:


a. Copyright
The exclusive legal right, given to an originator or an assignee to print,
publish, perform, film, or record literary, artistic, or musical material, and to
authorize others to do the same.

Copyright infringement is the violation, piracy or theft of a copyright holder's


exclusive rights through the unauthorized use of a copyrighted material or
work.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
b. Plagiarism
An act or instance of using or closely imitating the language and thoughts
of another author without authorization.

c. Computer Addiction
• Offline: generally used when speaking about excessive gaming behavior,
which can be practiced both offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in general
from scientific research than offline computer addiction, mainly because
most cases of computer addiction are related to the excessive use of the
Internet.
*Virtual Self -The persona you create about yourself virtually.

CRIMINAL ACTIVITIES
a. Hacking
• Unauthorized access of or interference with computer systems, servers, or
other information and communication systems
• Unauthorized access to corrupt, alter, steal, or destroy electronic data
using computers or other information and communication systems without
the computer or system owner’s knowledge and consent
• The introduction of computer viruses resulting in the corruption, alteration,
theft, or loss of such data
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is committed against
critical infrastructure of the Philippines the, penalty is between 12-20 years
reclusion temporal
• Six years up to twelve years of imprisonment also known as prison mayor.

b. Computer-related forgery, fraud and/or identity theft


• An attempt to obtain sensitive information such as usernames, passwords,
and credit card details and (indirectly money), often for malicious reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php 200,000 fine or prison mayor

c. Electronic theft
• Illegal Downloading
• Obtaining files that you do not have the right to use from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video, computer
software, etc.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor

d. Cyberbullying
• The use of electronic communication to bully a person, typically by
sending a message of an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)

e. Cybersex
• Willful engagement, maintenance, control, or operation, directly or
indirectly of any lascivious exhibition of sexual organs or sexual activity with
the aid of a computer system for favor or consideration.
• There is a discussion on this matter if it involves “couples” or “people in
relationship” who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor

f. Child Pornography
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and punishable by Republic Act No.
9775 or the AntiChild Pornography Act of 2009, committed through a
computer system.
• Penalty of 12-20 years of imprisonment or reclusion temporal

g. Cyber Defamation
• Is an unprivileged false statement of fact which tends to harm the
reputation of a person or company.
• Penalty of 6-12 years of imprisonment or prison mayor.

Lesson 3.3: Internet Threats


Hacking
Hacking is a term used to describe actions taken by someone to
gain unauthorized access to a computer. The availability of information
online on the tools, techniques, and malware makes it easier for even
non-technical people to undertake malicious activities. The process by
which cyber criminals gain access to your computer.

What it can do:


• Find weaknesses (or pre-existing bugs) in your security settings and exploit them
in order to access your information.
• Install a Trojan horse, providing a back door for hackers to enter and search for
your information.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

Malware
Malware is one of the more common ways to infiltrate or damage
your computer. Malicious software that infects your computer, such as
computer viruses, worms, Trojan horses, spyware, and adware.

What it can do:


• Intimidate you with scareware, which is usually a pop-up message that tells you
your computer has a security problem or other false information.
• Reformat the hard drive of your computer causing you to lose all your
information.
• Alter or delete files.
• Steal sensitive information.
• Send emails on your behalf.
• Take control of your computer and all the software running on it.

Pharming
Pharming is a common type of online fraud. A means to point you to
a malicious and illegitimate website by redirecting the legitimate URL.
Even if the URL is entered correctly, it can still be redirected to a fake
website.

What it can do:


• Convince you that the site is real and legitimate by spoofing or looking almost identical
to the actual site down to the smallest details. You may enter your personal information
and unknowingly give it to someone with malicious intent.

Phishing
Phishing is used most often by cyber criminals because it's easy to
execute and can produce the results they're looking for with very little
effort. Fake emails, text messages and websites created to look like
they're from authentic companies. They're sent by criminals to steal
personal and financial information from you. This is also known as
“spoofing”.

What it does:
• Trick you into giving them information by asking you to update, validate or
confirm your account. It is often presented in a manner than seems official and
intimidating, to encourage you to take action.
• Provides cyber criminals with your username and passwords so that they can
access your accounts (your online bank account, shopping accounts, etc.) and
steal your credit card numbers.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

Ransomware
Ransomware is a type of malware that restricts access to your
computer or your files and displays a message that demands payment
in order for the restriction to be removed. The two most common means
of infection appear to be phishing emails that contain malicious
attachments and website pop-up advertisements.

What it can do:


• There are two common types of ransomware:
• Lockscreen ransomware: displays an image that prevents you from accessing
your computer
• Encryption ransomware: encrypts files on your system's hard drive and sometimes
on shared network drives, USB drives, external hard drives, and even some cloud
storage drives, preventing you from opening them
• Ransomware will display a notification stating that your computer or data have
been locked and demanding a payment be made for you to regain access.
Sometimes the notification states that authorities have detected illegal activity on
your computer, and that the payment is a fine to avoid prosecution.

What you can do:


• Do not pay the ransom. These threats are meant to scare and intimidate you,
and they do not come from a law enforcement agency. Even if you submit
payment, there is no guarantee that you will regain access to your system.
• If your computer has been infected (i.e. you are unable to access your
computer or your files have been encrypted), contact a reputable computer
technician or specialist to find out whether your computer can be repaired and
your data retrieved.
• In order to lessen the impact of a ransomware infection, be sure to regularly
back-up your data with a removable external storage drive. It's possible that your
files might be irretrievable; having an up-to-date backup could be invaluable.

Spam
Spam is one of the more common methods of both sending
information out and collecting it from unsuspecting people. The mass
distribution of unsolicited messages, advertising or pornography to
addresses which can be easily found on the Internet through things like
social networking sites, company websites and personal blogs.

What it can do:


• Annoy you with unwanted junk mail.
• Create a burden for communications service providers and businesses to filter
electronic messages.
• Phish for your information by tricking you into following links or entering details
with too-goodto-be-true offers and promotions.
• Provide a vehicle for malware, scams, fraud and threats to your privacy.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Spyware (Spyware & Adware)
Spyware and adware are often used by third parties to infiltrate your
computer.

What it is: Software that collects personal information about you without
you knowing. They often come in the form of a ‘free' download and are
installed automatically with or without your consent. These are difficult to remove and
can infect your computer
with viruses.

What it can do:


• Collect information about you without you knowing about it and give it to third
parties. • Send your usernames, passwords, surfing habits, list of applications you've
downloaded, settings, and even the version of your operating system to third
parties.
• Change the way your computer runs without your knowledge.
• Take you to unwanted sites or inundate you with uncontrollable pop-up ads.

Trojan Horses
A Trojan horse may not be a term you're familiar with, but there's a
good chance you or someone you know has been affected by one. A
malicious program that is disguised as, or embedded within, legitimate
software. It is an executable file that will install itself and run automatically
once it's downloaded.

What it can do:


• Delete your files.
• Use your computer to hack other computers.
• Watch you through your web cam.
• Log your keystrokes (such as a credit card number you entered in an online
purchase). • Record usernames, passwords and other personal information.

Viruses
Most people have heard of computer viruses, but not many know
exactly what they are or what they do. Malicious computer programs
that are often sent as an email attachment or a download with the intent
of infecting your computer, as well as the computers of everyone in your
contact list. Just visiting a site can start an automatic download of
a virus.

What they can do:


• Send spam.
• Provide criminals with access to your computer and contact lists.
• Scan and find personal information like passwords on your computer.
• Hijack your web browser.
• Disable your security settings.
• Display unwanted ads.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
• When a program is running, the virus attached to it could infiltrate your hard drive
and also spread to USB keys and external hard drives. Any attachment you create
using this program and send to someone else could also infect them with the virus.

How will you know if your computer is infected? Here are a few things to check for:
• It takes longer than usual for your computer to start up, it restarts on its own or
doesn't start up at all.
• It takes a long time to launch a program.
• Files and data have disappeared.
• Your system and programs crash constantly.
• The homepage you set on your web browser is different (note that this could be
caused by Adware that has been installed on your computer).
• Web pages are slow to load.
• Your computer screen looks distorted.
• Programs are running without your control.
• If you suspect a problem, make sure your security software is up to date and run
it to check for infection. If nothing is found, or if you are unsure of what to do, seek
technical help.

Wi-Fi Eavesdropping
WiFi eavesdropping is another method used by cyber criminals to
capture personal information. Virtual “listening in” on information that's
shared over an unsecure (not encrypted) WiFi network.

What it can do:


• Potentially access your computer with the right equipment.
• Steal your personal information including logins and passwords.

Worms
Worms are a common threat to computers and the Internet as a
whole. A worm, unlike a virus, goes to work on its own without attaching
itself to files or programs. It lives in your computer memory, doesn't
damage or alter the hard drive and propagates by sending itself to
other computers in a network – whether within a company or the
Internet itself.

What they can do:


• Spread to everyone in your contact list.
• Cause a tremendous amount of damage by shutting down parts of the Internet,
wreaking havoc on an internal network and costing companies’ enormous
amounts of lost revenue.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
References
• http://www.mccc.edu/~virtcoll/Netiquette
• http://ecampus.matc.edu/student_support/pdfs/7-essential-rules-of-netiquette.pdf
• https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

LESSON 4: DIGITAL TECHNOLOGY AND


SOCIAL CHANGE
Overview
The internet and telecommunication industry in the 1990s changed the way we
connect and exchange information. Digital technology impacted people in many ways.
By the way people live, work, learn, and socialize. Digital technology comprises of
electronic tools, devices and systems that generate, store and process data. It enables
us to experience the benefits of advanced information technology systems. Such as
efficiency and productivity, improved communication and collaboration and faster
acquisition of information. In this lesson, we will discuss the digital age and its effect in
society, the two-essential theory in technology, and how technological change takes
place.

Objectives
At the end of this lesson, the students should be able to:
• Explain the role of ICT in social change.
• Identify the strengths, weaknesses, opportunities, and imminent threats of the
digital age.
• Articulate basic, but fundamental definitions of complex issues and dynamics
that humans encounter every day, such as technology, social progress,
development, and digitalization.

Lesson 4.1: Introduction to the Digital Age


Digital age, also known as Information age, is a period when the computer and
internet were introduced. It is caused by rapid shift from traditional industry to
computerization all the way to artificial intelligence which brought by Industrial
Revolution. These technologies enabled people to communicate information easily and
rapidly. Digital Technology became prevalent and widely used around the world.
Information can be accessed easily specially with the use of the internet. House chores
and jobs are getting automated with the help of machines and equipment. Mobile
phones became very useful in every areas of life --- in education, entertainment, jobs,
etc. Digital technologies have radically changed the way people work, consume, and
communicate over a short period of time.

The ICT and its role in Social Change

Information Communications Technology (ICT) has the power to transform society.


ICT is defined as a group of interrelated technologies (electronic devices) for accessing,
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
processing, and disseminating information. It is a system of electronic network activated
through a complex hardware and software systems linked by a vast array of technical
protocols. ICTs are indisputably important part of our social setting today. The term ICTs
has been used to embrace technological innovation and merging in information and
communication transforming our world into information or knowledge societies. The rapid
development of these technologies has fainted the boundaries between information,
communication, and various types of media.

The development of a society mostly depends on the access to information. The


Information and Communication Technologies (ICTs) greatly ease the flow of information
and knowledge offering the socially marginalized community an extraordinary chance
to attain their own rights socially, economically, educationally, and politically. Despite
ICT’s massive potential, the current global information outburst has had surprisingly little
impact on development activities and access to practical information for rural
communities, local people, and forefront development workers in developing countries.
The emergence of Internet, World Wide Web, mobile cell phones, digital television, and
several other new electronic devices pertaining information and communication
technologies (ICTs) are opening a fresh passageways for transforming the way we live,
work, learn, communicate and also provides a strategic opportunities of diverse and
significant social and economic benefits to people across the globe. It also enables
financial inclusion through mcommerce and allows people to connect with millions
instantaneously.

Social change refers to a transformation of culture and social


organizations/structures over time. We are aware that in a modern world, a society is
never static and that of social, political, economic, and cultural changes occurs
constantly. The social transformations that could result from the increasing use of ICTs
depend strangely on verdicts made by organizations and individuals outside our
household, many of whom have great economic leverage, political power or technical
expertise. To increase the consent potential of ICTs, it is important to understand some of
their basic features, which make them a unique kind of technologies.

Entertainment

With the advent of new technologies, the world of entertainment is


constantly evolving. Digital broadcasting has completely changed the way we
experience television and radio. Cinema can now be found at the comfort of
your home through application such as Netflix, iFlix, etc. We get entertained by
the content that we see in Facebook, YouTube, and Instagram. Computer
gaming has also been an important influence in the development of graphical
interfaces. Technology has been at the forefront of changes in production and
distribution of music. We can now listen to music and podcast using Spotify. These
are some of the many technologies we use for entertainment that arise in the
Digital Age.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Business

The impact of ICT on business is particularly significant. It empowers people


to share knowledge and advice instantaneously and set up an online shop or
website at a low cost, dramatically lowering the barriers to starting a business. As
such, ICT maturity is closely linked to economic growth.

Businesses in today’s life have promoted a lot with the coming of ICT. Its
impact cannot be over emphasized. For example, ICT helps to increase
productivity in business with the use of social Media platforms for marketing and
promotion. The use of websites now allowed companies to develop new and
cheaper ways of offering customers with opportunities of buying goods and
services at their convenient time and enhance the level of customer service.
Online platform has been the marketplace where people can transact and
communicate.

The impact of ICT infrastructure on social businesses cannot be


understated. It has made social impact affordable, social impact scalable, and
enables new ways to connect to and engage with local communities.

Education

The impact of ICT on teachers, trainers, learners, researchers and the entire
education society is tremendous. It is changing the way of the education delivery
system in the world by enhancing access to information for all. It also ensures
effective and inclusive education. ICT supports the concept of open learning
where the thrust is upon enhanced student access and the development of
student autonomy.

ICT can play varied roles in developing an effective learning environment.


It assists teachers and helps explain core content concepts and addresses
misconceptions. It acts as a stimulant and fosters analytical thinking and
interdisciplinary studies. It networks a learner with the peers and experts and
develops collaborative atmosphere. It plays the role of a guide and mentor by
providing tailor made instructions to meet individual needs. Online learning
facilitates learning through digital mode. With the help of multimedia, it enhances
effectiveness of teaching-learning and hence proves crucial for early learners,
slow learners and differently abled learners. Modern ICT tools not only deliver the
content but also replicate formal learning experience via virtual learning. The
intention of virtual classrooms is to extend the structure and services that
accompany formal education programs from the physical environment to
learners.

ICT also addresses the need of mobile learning. It offers independent space
and flexibility that comes from working away from the learning institute or tutor. It
makes education accessible to all, irrespective of geographical barriers or
resource constraints. Learners from remote areas, working people who want to
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
learn further and update their knowledge and differently abled students who find
travelling an issue of concern - benefit from the mobile learning mode.

Digital resources in classrooms can help prepare students for a digital society and
economy

Digital technologies can unlock new learning opportunities in the classroom


by giving students access to a wider range of resources, by complementing the
teacher in learning processes (computer-assisted learning) and by providing other
advantages to students, such as access to motivational and informational
resources associated with access to tertiary education programs.. Access to
technology is quite certainly beneficial to students’ digital skills and provide a clear
advantage to students in that area. But the effects on other learning outcomes
are generally considered limited or potentially negative. Some studies find that
computer-assisted learning has some positive effects, especially in science and
mathematics, because it provides students with personalized learning modules
that are adapted to their level.

Jobs and earnings

Beyond income security, employment fulfils a number of important roles for


human wellbeing, such as time structure, social contact, a sense of purpose, a
valued social position as well as an opportunity for skill use. For this reason, the
labor market effects of the digital transformation are among the most significant
for people’s well-being. The digital transformation has the potential to generate
substantial changes in the composition of the labor market as jobs that require
certain skillsets are replaced by a combination of technology and higher skilled
labor, or even completely automated. At the same time, digitalization yields
opportunities by creating employment in new and existing industries, with greater
job-to-job mobility facilitated by online job search tools. The digital economy also
fundamentally changes the nature of work for many people, with fewer jobs
exerting physical demands on workers but more jobs placing an emotional strain
on desk-workers. New jobs in ICT and in other sectors become available.

Despite fears for the automation, there is little evidence so far that
technological change has led to a net loss of jobs. There are theoretical reasons
for which technological progress may contribute to job creation. Efficiency gains
and cost-savings may induce job creation within industries by expanding the
market and therefore increasing demand. Increased productivity in one sector
can also have positive spillovers in other sectors, if this translates into lower prices
and higher demand across the economy. While these processes may imply short-
term unemployment among displaced workers, they have the potential to
generate economy-wide employment gains.

Digital technologies may destroy jobs at risk of automation


Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
While the previous section has pointed to the lack of evidence of the
negative effects of technological change on total employment so far, a number
of authors have argued that ICTbased technological change will be more
profound than previous instances of great technological change. This argument
is mainly supported by the observation that the laborsaving potential of digital
technologies is far greater than in the case of previous technological changes. As
a result, automation may, in the future, have much more impactful consequences
on the need for human labor than it has so far. For the moment, while a shift away
from manufacturing jobs has been observed, this has not translated to overall
losses in employment, as middle-skill jobs have been replaced by new high-skill
and low-skill jobs.

Concerns of the automation of jobs are warranted, however, at least in


order to make the case for the need to invest in the most appropriate skills for the
future digital economy. Thus far, estimates of the impact of automation mainly rely
on expert’s predictions of the types of tasks that are likely to be replaced by
machines. Previous estimates by Autor, Levy and Murnane (2003) quickly proved
to be too cautious: tasks that Autor et al. considered to be out of reach for
machines, such as truck driving, are already being threatened by rapid advances
in machine learning and AI. More recent estimates of the potential
jobdisplacement effects of automation have looked at job tasks rather than entire
job categories. Food preparation assistants, cleaners and helpers, laborers in
mining, construction, manufacturing and transport, and assemblers are the most
likely to see their job tasks automated, while teaching professionals, health
professionals and personal care workers are among the least likely to lose their job
to a machine. Similarly, Schwab (2016) and Susskind and Susskind (2015) consider
that the work of lawyers, financial analysts, journalists, doctors or librarians could
be partially or totally automated. Schwab (2016) emphasizes that algorithms
made available by AI are able to successfully replace human actions, even
creative ones. The author presents the example of automated narrative
generation, in which algorithms can conceive written texts for particular types of
audience.

Teleworking (Work from Home) allows people to save time and combine their work
and personal lives

Teleworking (Work from Home), on the other hand, may present an


opportunity for work-life balance as it improves time management and may
reduce time spent commuting. A variety of studies have found that employees
who engage in telework have higher job satisfaction. Among positive effects,
teleworkers report reduced commuting times, more flexibility in organizing their
working time, and better overall work-life balance. Evidence from the American
Time Use Survey shows that reductions in the time spent commuting and in-home
production due to Internet increase labor force participation.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Health

Digitalization can affect people’s health status through the emergence of


new physical and mental health risks and through its impact on the health-care
delivery system. Health risks associated with the digital transformations include
mental health problems associated with the extreme use of digital technologies,
especially among children and teenagers and the crowding out of other activities
such as physical exercise. Health-care delivery is also affected by new digital
technologies, such as electronic records, new treatment options, telecare, and
teleconsultation. An important aspect of digitalization concerns the production
and use of medical data to improve the effectiveness and efficiency of health
systems. As a caveat, the exchange and use of medical and health data must
meet high data protection and data security standards, considering its sensitivity.
How and where care is delivered is also affected by digital innovations, which
challenges the traditional role of care providers, with implications for interactions
among care providers and between providers and patients. The effects of these
changes in healthcare delivery of health inequalities are potentially large, but also
less well documented.

Extreme use of digital technologies may have negative mental health effects

The effects of mobile phones, video games, and the pervasiveness of


ubiquitous screens on the mental health of children and teenagers have drawn
significant attention in the public debate because they may present risks of
addiction. Extreme Internet use, defined as children who spend more than 6 hours
on the Internet outside of school, is becoming more common among children and
teenagers, with time spent online by 15-year-olds increasing by about 40 minutes
between 2012 and 2015 on average. A study also found that the iGeneration
members (the generation grown up in an environment where technology is
ubiquitous) check their social media accounts on average every 15 minutes. While
video games used to be the primary source of extreme use of digital technologies,
the smartphone has extended this risk to a wider range of applications. A recent
study found that 39% of 18- to 29-year-olds in the United States are online “almost
constantly”.

Research suggests that the Internet triggers neurological processes similar


to other addictive substances and activities, i.e. experiences of short-term
pleasure in the brain’s “reward center”. This area releases a combination of
dopamine, opiates and other neurochemicals when activated, a mechanism that
can be compromised over time due to the deterioration of associated receptors,
requiring even more stimulation to get a similar response. Children and teenagers,
for biological reasons, are more susceptible to addiction because their brain is still
in development. For example, a study among 14-year-olds in Belgium found that
frequent gamers had brain abnormalities compared to other teens, potentially
resulting from dopamine releases associated with video games.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
There is evidence of a direct link between extreme Internet use and
depression and anxiety, but the nature of this relationship is disputed and is likely
to be bi-directional, as people with anxiety, depression and other mental health
problems are also potentially more likely to spend time online. A longitudinal study
run on 3 000 children in Singapore found that extreme video game use and
problems such as social phobia, attention deficit disorder, anxiety and depression
often occur together and are likely to be mutually reinforcing.

Theories in Technology

Technological Determinism

It is the theory which strongly believe that technology shapes the culture,
values, and social structures of a society. The main reason why society progresses
is because of the kind technology the society has. Technological innovation is the
cause of the social progress. The technology has the control over the society ---
over human actions, culture and values. Technology greatly influences human
thought and action. In other words the society is changing because of
technology.

According to Winner, technology is not the slave of the human being but
rather humans are slaves to technology as they are forced to adapt to the
technological environment that surrounds them.

Example. The Medium is the Message by Marshall McLuhan. The technology


which is used as a channel of communication matter more than the content.

Example. The invention of the stirrup. It is the foot support for horse-riders. Before
its invention, riders were not able to use swords while riding in a horse because
they may lose balance. When the stirrup was invented, it enabled armored
knights to fight on horseback. Because of this, it brought the development of
feudal societies --- a military rule by nobles or lords

Example. The invention of gun. Before, the weapons used were swords and
archery --- soldiers had to be skilled and trained in using these weapons. But a
new invention in technology changed it all. A gun was invented which require a
less effort and can be used even from far distances. This technology changed the
way soldiers are trained. It also changed how soldiers fight in a war.

Social Constructivism

Social Constructivism is the opposite of the Technological Determinism.


Social Constructivism believes that humans play a main role in shaping technology
rather than technology shaping society. It believes that technology does not
determine human action, but rather, human action shapes the technology. Our
curiosity, the hunger to expand, and the need to do things efficiently drive us to
create these technologies.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Technological Change

Technological change means the technical knowledge used in the


production of capital and machinery. The various changes in technology leads to
an increase in the productivity of labor, capital and other production factors.
Technological progress comprises of creation of skill, new means of production,
new uses of raw materials and the widespread use of machinery.

The technology is the most powerful means of wresting power from nature
in all possible ways. It strengthens the facilities of man. Prof. Frankel assumes that
the, “Technological change is not a mere improvement in the technical know-
how. It means much more than this. It should be preceded by sociological change
also, a willingness and desire on the part of community to modify their social,
political and administrative institutions so as to make them fit with new techniques
of production and faster tempo of economic activity.” Technology, according to
J. P. Dewhurts, in fact, can be thought of as the change in the production process
of material and human skills.

Process of Technological Change

Technological changes devise new goods and techniques of production. The


development of new technical knowledge can be defined as the growth of the new
technique that can produce goods and services at lesser cost of production.

The process of growth of technical knowledge can be divided into following


stages:

• Formulation of scientific principles


• Application of these principles to give technical problems
• Development of technical inventions to the point of commercial exploitation.

The first stage is the advancement in scientific knowledge, the second is that of
the application of this knowledge to some useful purposes and third is the
commercialization of invention which is called innovation. This has a great significance in
the process of development. Schumpeter has distinguished between invention and
innovation. Invention implies the discovery of new technique while innovation is practical
application of invention in production for market.

It may be called commercialization that originates from scientific advancement.


Invention is scientific fact while innovation is economic fact. Inventions are carried on by
the inventors’ large capital investments at every stage as it needs not only a scientific
attitude but an attitude of the community and an entrepreneurial skill of high order with
the ability to understand the possibilities of employing scientific incentives for commercial
purposes.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
References
• Muhammad Adam, Faisal. (2016). "Information and Communication Technology
(ICT), Social Changes and Transformation". 10.13140/RG.2.2.22371.60960.
• Debasish. “Technological Change: It's Meaning and Process.” Economics
Discussion, 11 Aug. 2015, www.economicsdiscussion.net/articles/technological-
change-its-meaning-andprocess/4447.
• Tikam, Madhuri V. “Impact of ICT on Education.” International Journal of
Information Communication Technologies and Human Development (IJICTHD),
IGI Global, 1 Oct. 2013, www.igi-global.com/article/impact-of-ict-on-
education/102982.
• “The Social Impact of ICT.” Ericsson.com, 13 Dec. 2019,
www.ericsson.com/en/reports-andpapers/networked-society-insights/social-
business/social-impact-of-ict.
• “Digital Age.” Digital Age Dictionary Definition | Digital Age Defined,
www.yourdictionary.com/digital-age.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

LESSON 5: IT CULTURE AND THE SOCIETY

Overview
Technology is changing every aspect of our lives. The benefits provided by new
digital approaches are having a huge impact on our societies. However, one of the
greatest business challenges is not about the devices, software or solutions – it is about
how we manage the process of cultural change and its effect to our society. In this
module we will learn what are the different technological advancements and future
trends in technology that could potentially change and shaped the way we live our lives.

Objectives
At the end of this module, learners are expected to:
• Identify what are the current and emerging trends in technology;
• Understand how technology affects culture and society trough through the
different advancements in technology;
• Asses the positive and negative effects of said advancement.

Lesson 5.1: Internet of Things


The "Internet of things" (IoT) is becoming an increasingly growing topic of
conversation both in the workplace and outside of it. It's a concept that not only has the
potential to impact how we live but also how we work. But what exactly is the "Internet
of things" and what impact is it going to have on you, if any?

Lightbulbs, along with refrigerators,


coffee makers, microwave ovens, baby
monitors, security cameras, speakers,
televisions, and thermostats have, in the
past few decades, transformed from
ordinary objects into conduits for the future.
Embedded with sensors that see, hear, and
touch the world around them, they can turn
physical information into digital data.
Collectively, these devices— and there are
billions of them around the world—make up
the “internet of things.”

Figure 1.1 Internet of Things


Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Just about anything with network connectivity belongs to the internet of things,
from security cameras and speakers to smart watches and denim jackets. In the “smart
home,” these internetenabled gadgets liberate us from our chores, give us back some
of our time, and add a dash of novelty to ordinary experiences. (“Alexa, turn on the disco
lights.”) But the internet of things is about more than just using your voice to preheat the
oven or using your phone to turn off the lights.

The real promise of the internet of things is making our physical surroundings
accessible to our digital computers, putting sensors on everything in the world and
translating it into a digital format. Internet-connected objects could be the key to
unlocking predictions about everything from consumer behavior to climate events, but
those same objects could invite hackers into personal spaces and leak intimate data.
Depending on who you ask, the growing internet of things either represents the promise
of technology—the thing that will reinvent modern life as we know it—or that which will
be our technological undoing.

How IoT works


An IoT ecosystem consists of web-enabled smart devices that use embedded
systems, such as processors, sensors and communication hardware, to collect, send and
act on data they acquire from their environments. IoT devices share the sensor data they
collect by connecting to an IoT gateway or other edge device where data is either sent
to the cloud to be analyzed or analyzed locally. Sometimes, these devices communicate
with other related devices and act on the information they get from one another. The
devices do most of the work without human intervention, although people can interact
with the devices -- for instance, to set them up, give them instructions or access the data.

The connectivity, networking and communication protocols used with these web-
enabled devices largely depend on the specific IoT applications deployed.

IoT can also make use of artificial intelligence (AI) and machine learning to aid in
making data collecting processes easier and more dynamic.

Why IoT is important


The internet of things helps people live and work smarter, as well as gain complete
control over their lives. In addition to offering smart devices to automate homes, IoT is
essential to business. IoT provides businesses with a real-time look into how their systems
really work, delivering insights into everything from the performance of machines to
supply chain and logistics operations.

IoT enables companies to automate processes and reduce labor costs. It also cuts
down on waste and improves service delivery, making it less expensive to manufacture
and deliver goods, as well as offering transparency into customer transactions.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
As such, IoT is one of the most important technologies of everyday life, and it will
continue to pick up steam as more businesses realize the potential of connected devices
to keep them competitive.

How Does This Impact You?


The new rule for the future is going to be, "Anything that can be connected, will
be connected." But why on earth would you want so many connected devices talking
to each other? There are many examples for what this might look like or what the
potential value might be. Say for example you are on your way to a meeting; your car
could have access to your calendar and already know the best route to take. If the traffic
is heavy your car might send a text to the other party notifying them that you will be late.
What if your alarm clock wakes up you at 6 a.m. and then notifies your coffee maker to
start brewing coffee for you? What if your office equipment knew when it was running
low on supplies and automatically re-ordered more? What if the wearable device you
used in the workplace could tell you when and where you were most active and
productive and shared that information with other devices that you used while working?

On a broader scale, the IoT can be applied to things like transportation networks:
"smart cities" which can help us reduce waste and improve efficiency for things such as
energy use; this helping us understand and improve how we work and live. The reality is
that the IoT allows for virtually endless opportunities and connections to take place, many
of which we can't even think of or fully understand the impact of today.

IoT Through the Years


1990
John Romkey creates the first IoT device: a toaster that he controls with his
computer

1999
Kevin Ashton coins the term “internet of things” to describe the eyes and ears of a
computer

2000
LG introduces its first connected refrigerator with a $20,000 pricetag

2008
The world’s first IoT conference is held in Zurich, Switzerland

2010
Tony Fadell founds Nest, maker of the smart thermostat

2013
Oxford Dictionary adds the term “internet of things”
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
2014
Amazon introduces the Echo speaker, along with the Alexa voice assistant—a new
way to control the smart home

2016
The Mirai botnet infects over 600,000 IoT devices with malware

2020
The number of internet-connected devices, by some estimates, exceeds 20 billion

The first internet-connected “thing” to make use of this new protocol was a toaster.
John Romkey, a software engineer and early internet evangelist, had built one for the
1990 showfloor of Interop, a trade show for computers. Romkey dropped a few slices of
bread into the toaster and, using a clunky computer, turned the toaster on. It would still
be a decade before anyone used the phrase “internet of things,” but Romkey’s magic
little toaster showed what a world of internet-connected things might be like. (Of course,
it wasn’t fully automated; a person still had to introduce the bread.) It was part gimmick,
part proof of concept—and fully a preview of what was to come.

The term “internet of things” itself was coined in 1999, when Kevin Ashton put it in
a PowerPoint presentation for Procter & Gamble. Ashton, who was then working in supply
chain optimization, described a system where sensors acted like the eyes and ears of a
computer—an entirely new way for computers to see, hear, touch, and interpret their
surroundings.

As home internet became ubiquitous and Wi-Fi sped up, the dream of the smart
home started to look more like a reality. Companies began to introduce more and more
of these inventions: “smart” coffee makers to brew the perfect cup, ovens that bake
cookies with precision timing, and refrigerators that automatically restocked expired milk.
The first of these, LG’s internet-connected refrigerator, hit the market in 2000. It could take
stock of shelf contents, mind expiration dates, and for some reason, came with an MP3
player. It also cost $20,000. As sensors became cheaper, these internet-connected
devices became more affordable for more consumers. And the invention of smart plugs,
like those made by Belkin, meant that even ordinary objects could become “smart”—or,
at least, you could turn them on and off with your phone.

Any IoT system today contains a few basic components. First, there’s the thing
outfitted with sensors. These sensors could be anything that collects data, like a camera
inside a smart refrigerator or an accelerometer that tracks speed in a smart running shoe.
In some cases, sensors are bundled together to gather multiple data points: a Nest
thermostat contains a thermometer, but also a motion sensor; it can adjust the
temperature of a room when it senses that nobody’s in it. To make sense of this data, the
device has some kind of network connectivity (Wi-Fi, Bluetooth, cellular, or satellite) and
a processor where it can be stored and analyzed. From there, the data can be used to
trigger an action—like ordering more milk when the carton in the smart refrigerator runs
out, or adjusting the temperature automatically given a set of rules.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Most people didn’t start building an ecosystem of “smart” devices in their homes
until the mass adoption of voice controls. In 2014, Amazon introduced the Echo, a
speaker with a helpful voice assistant named Alexa built in. Apple had introduced Siri, its
own voice assistant, four years prior— but Siri lived on your phone, while Alexa lived inside
the speaker and could control all of the “smart” devices in your house. Positioning a voice
assistant as the centerpiece of the smart home had several effects: It demystified the
internet of things for consumers, encouraged them to buy more internet-enabled
gadgets, and encouraged developers to create more “skills,” or IoT commands, for these
voice assistants to learn.

The same year that Amazon debuted Alexa, Apple came out with HomeKit, a
system designed to facilitate interactions between Apple-made smart devices, sending
data back and forth to create a network. These unifying voices have shifted the
landscape away from single-purpose automations and toward a more holistic system of
connected things. Tell the Google Assistant “goodnight,” for example, and the
command can dim the lights, lock the front door, set the alarm system, and turn on your
alarm clock. LG’s SmartThinQ platform connects many home appliances, so you can
select a chocolate chip cookie recipe from the screen of your smart fridge and it’ll
automatically preheat the oven. Manufacturers bill this as the future, but it’s also a
convenient way to sell more IoT devices. If you already have an Amazon Echo, you might
as well get some stuff for Alexa to control.

By 2014, the number of internet-connected devices would surpass the number of


people in the world. David Evans, the former chief futurist at Cisco, estimated in 2015 that
“an average 127 new things are connected to the internet” every second. Today, there
are over 20 billion connected things in the world, according to estimates from Gartner.
The excitement around the brave new internet connected world has been matched with
concern. All of these objects, brought to life like Pinocchio, have made the world easier
to control: You can let the delivery man in the front door, or change the temperature
inside the house, all with a few taps on a smartphone.

IoT benefits to organizations


The internet of things offers several benefits to organizations. Some benefits are
industry-specific, and some are applicable across multiple industries. Some of the
common benefits of IoT enable businesses to:
• monitor their overall business processes;
• improve the customer experience;
• save time and money;
• enhance employee productivity;
• integrate and adapt business models;
• make better business decisions; and
• generate more revenue.

IoT encourages companies to rethink the ways they approach their businesses and
gives them the tools to improve their business strategies.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Generally, IoT is most abundant in manufacturing, transportation and utility
organizations, making use of sensors and other IoT devices; however, it has also found
use cases for organizations within the agriculture, infrastructure and home automation
industries, leading some organizations toward digital transformation.

IoT can benefit farmers in agriculture by making their job easier. Sensors can
collect data on rainfall, humidity, temperature and soil content, as well as other factors,
that would help automate farming techniques.
The ability to monitor operations surrounding infrastructure is also a factor that IoT can
help with.

Sensors, for example, could be used to monitor events or changes within structural
buildings, bridges and other infrastructure. This brings benefits with it, such as cost saving,
saved time, quality-of-life workflow changes and paperless workflow.

A home automation business can utilize IoT to monitor and manipulate


mechanical and electrical systems in a building. On a broader scale, smart cities can
help citizens reduce waste and energy consumption.

IoT touches every industry, including businesses within healthcare, finance, retail
and manufacturing.

Pros and cons of IoT


Advantages of IoT
• ability to access information from anywhere at any time on any device;
• improved communication between connected electronic devices;
• transferring data packets over a connected network saving time and
money; and
• automating tasks helping to improve the quality of a business's services
and reducing the need for human intervention.

Disadvantages of IoT
• As the number of connected devices increases and more information is
shared between devices, the potential that a hacker could steal
confidential information also increases.
• Enterprises may eventually have to deal with massive numbers -- maybe
even millions -- of IoT devices, and collecting and managing the data from
all those devices will be challenging.
• If there's a bug in the system, it's likely that every connected device will
become corrupted.
• Since there's no international standard of compatibility for IoT, it's difficult
for devices from different manufacturers to communicate with each other.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Consumer and enterprise IoT applications
There are numerous real-world applications of the internet of things, ranging from
consumer IoT and enterprise IoT to manufacturing and industrial IoT (IIoT). IoT applications
span numerous verticals, including automotive, telecom and energy.

In the consumer segment, for example, smart homes that are equipped with smart
thermostats, smart appliances and connected heating, lighting and electronic devices
can be controlled remotely via computers and smartphones.

Wearable devices with sensors and software can collect and analyze user data,
sending messages to other technologies about the users with the aim of making users'
lives easier and more comfortable. Wearable devices are also used for public safety --
for example, improving first responders' response times during emergencies by providing
optimized routes to a location or by tracking construction workers' or firefighters' vital signs
at life-threatening sites.

In healthcare, IoT offers many benefits, including the ability to monitor patients
more closely using an analysis of the data that's generated. Hospitals often use IoT
systems to complete tasks such as inventory management for both pharmaceuticals and
medical instruments.

Smart buildings can, for instance, reduce energy costs using sensors that detect
how many occupants are in a room. The temperature can adjust automatically -- for
example, turning the air conditioner on if sensors detect a conference room is full or
turning the heat down if everyone in the office has gone home.

In agriculture, IoT-based smart farming systems can help monitor, for instance,
light, temperature, humidity and soil moisture of crop fields using connected sensors. IoT
is also instrumental in automating irrigation systems.

In a smart city, IoT sensors and deployments, such as smart streetlights and smart
meters, can help alleviate traffic, conserve energy, monitor and address environmental
concerns, and improve sanitation.

IoT security and privacy issues

The internet of things brings all the benefits of the internet to items like lightbulbs
and thermostats, but it brings all the problems of the internet, too. Now that people have
their speakers, television sets, refrigerators, alarm clocks, toothbrushes, light bulbs,
doorbells, baby monitors, and security cameras connected to the Wi-Fi, nearly every
device in the house can be compromised, or rendered useless. Consider the whims of
internet connectivity: When your Wi-Fi goes down, so do your devices. Router problems?
That means you can’t turn on the heat with your smart thermostat or unlock your smart
door lock. Things that used to be easy become potentially faulty, if not impossible, when
they require an Alexa command or a smartphone control rather than a physical button.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Many of these devices also run on proprietary software—meaning, if their manufacturer
goes bunk, gets sold, or stops issuing software updates, your clever little gadget becomes
a useless hunk of plastic.

Risk of bricking aside, connecting things to the internet also leaves those objects,
and everything else on your Wi-Fi network, more vulnerable to hackers. Laura DeNardis,
in her recent book The Internet in Everything, has called this threat to cybersecurity the
greatest human rights issue of our time. The risk isn’t just that some prankster breaks into
your smart washing machine and upsets the spin cycle, or that your Nest camera gets
hijacked with a message to subscribe to PewDiePie’s YouTube channel. (Yes, that really
happened.) A hacked smart lock means someone can open your front door. Hack into
enough smart water heaters and you can send a city into a massive blackout. And one
vulnerable device can compromise the whole network. As WIRED’s Lily Hay Newman
points out, “IoT devices have been conscripted into massive botnets, compromised for
nation-state reconnaissance, hacked to mine cryptocurrency, and manipulated in
assaults on power grids.”

The threat to internet-connected devices comes not just because they’re


connected to the internet, but because device manufacturers have not always
designed their products with security as a priority. In 2016, malware called Mirai exploited
these kinds of vulnerabilities in over 600,000 IoT devices to create a massive distributed
denial of service (DDoS) attack. The following year, an attack called Krack infected
nearly every internet-connected device connected to Wi-Fi. The attack was crippling
and difficult to defend against, in part because the internet of things runs on so many
disparate operating systems. When a phone or a computer gets hit with a virus, software
makers are generally quick to issue a patch. But things like routers or internet-connected
doorbells don’t usually receive software updates needed to protect against
vulnerabilities, and many of them weren’t built with the same kind of security protocols
as computers. After the Krack attack, one security researcher predicted that we would
stitll “find vulnerable devices 20 years from now.”

Then there’s the question of privacy. If cameras and microphones are studded
around your home, they are definitely watching and listening to you. Everything in the
internet of things collects data— and all that data has value. In a recent study,
researchers found that 72 of the 81 IoT devices they surveyed had shared data with a
third party unrelated to the original manufacturer. That means the finer details of your
personal life—as depicted by your smart toothbrush, your smart TV, or your smart
speaker—can be repackaged and sold to someone else. Google and Apple both
admitted, last year, that the recordings captured by their smart speakers are reviewed
by contractors, including awkward and intimate snippets of audio. Amazon has
partnerships with over 400 police departments, who use the footage from its Ring doorbell
cameras to keep watch on neighborhoods. An ever-expanding internet of things doesn’t
just have consequences for personal privacy. It can create a network of computer eyes
and ears everywhere we go.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
Because IoT devices are closely connected, all a hacker has to do is exploit one
vulnerability to manipulate all the data, rendering it unusable. Manufacturers that don't
update their devices regularly -- or at all -- leave them vulnerable to cybercriminals.

Additionally, connected devices often ask users to input their personal


information, including names, ages, addresses, phone numbers and even social media
accounts -- information that's invaluable to hackers.

Hackers aren't the only threat to the internet of things; privacy is another major
concern for IoT users. For instance, companies that make and distribute consumer IoT
devices could use those devices to obtain and sell users' personal data.

Beyond leaking personal data, IoT poses a risk to critical infrastructure, including
electricity, transportation and financial services.

The Future of the Internet of Things


One day, the internet of things will become the internet of everything. The objects
in our world might sense and react to us individually all the time, so that a smart
thermostat automatically adjusts based on your body temperature or the house
automatically locks itself when you get into bed. Your clothes might come with
connected sensors, too, so that the things around you can respond to your movements
in real time. That’s already starting to happen: In 2017, Google announced Project
Jacquard, an effort to create the connected wardrobe of the future.

This vision extends far beyond your clothes, and even your home. You’ll also have
smart offices, smart buildings, smart cities. Smart hospital rooms will have sensors to ensure
that doctors wash their hands, and airborne sensors will help cities predict mudslides and
other natural disasters. Autonomous vehicles will connect to the internet and drive along
roads studded with sensors, and governments will manage the demands on their energy
grids by tracking household energy consumption through the internet of things. The
growth of the internet of things could also lead to new kinds of cyber warfare; imagine a
bad actor disabling every smart thermostat in the dead of winter, or hacking into internet-
connected pacemakers and insulin pumps. It could create new class systems: those with
robot maids, and those without. Or, as Ray Bradbury described in one short story from
1950, all the people might disappear—but the smart homes, preparing meals and
sweeping the floors, will live on.

If we’re going to get there—whether we like “there” or not—we’re going to need


faster internet. (Enter: 5G.) We’ll also need to keep all those devices from mucking up
the airwaves, and we’ll need to find a better way to secure the data that’s transmitted
across those airwaves. Recently, the Swiss cryptography firm Teserakt introduced an
idea for a cryptographic implant for IoT devices, which would protect the data that
streams from these devices. There are also ideas for creating a better standard for IoT
devices, and plans to help them get along with each other, regardless of which
company makes them or which voice assistant lives inside.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

Lesson 5.2: Current Trends and Emerging


Technologies
Overview
Information technology is an industry on the rise, and business structure, job
growth, and emerging technology will all shift in the coming years. Current trends are
improving and presenting new functions in fields like medicine, entertainment, business,
education, marketing, law enforcement, and more. Still, other much-anticipated
technology is only now coming on the scene.

Innovations in IT change internal company processes, but they are also altering
the way customers experience purchasing and support — not to mention basic practices
in life, like locking up your home, visiting the doctor, and storing files. The following trends
in information technology are crucial areas to watch in 2019 and viable considerations
that could influence your future career choices.

Current Trends in Information Technology


The latest technology methods and best practices of 2019 will primarily stem from
current trends in information technology. Advancements in IT systems relate to what the
industry is leaning toward or disregarding now. Information technology is advancing so
rapidly that new developments are quickly replacing current projections.

a. Cloud Computing

Cloud computing is a network of resources a company can access, and


this method of using a digital drive increases the efficiency of organizations.
Instead of local storage on computer hard drives, companies will be freeing their
space and conserving funds. According to Forbes, 83 percent of enterprise
workloads will be in the cloud by 2020, which means 2019 will show an increasing
trend closing in on this statistic.

Cloud storage and sharing is a popular trend many companies have


adopted and even implemented for employee interaction. A company-wide
network will help businesses save on information technology infrastructure. Cloud
services will also extend internal functions to gain revenue. Organizations that offer
cloud services will market these for external products and continue their
momentum.
Organizations will transfer their stored files across multiple sources using
virtualization. Companies are already using this level of virtualization, but will further
embrace it in the year to come. Less installation across company computers is
another positive result of cloud computing because the Internet allows direct
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
access to shared technology and information. The freedom of new products and
services makes cloud computing a growing trend.

b. Mobile Computing and Applications

Mobile phones, tablets, and other devices have taken both the business
world and the personal realm by storm. Mobile usage and the number of
applications generated have both skyrocketed in recent years. Now, 77 percent
of Americans own smartphones — a 35 percent increase since 2011. Pew
Research Center also shows using phones for online use has increased and fewer
individuals use traditional Internet services like broadband. Experts project mobile
traffic to increase even further in 2019, and mobile applications, consumer
capabilities, and payment options will be necessary for businesses. The fastest-
growing companies have already established their mobile websites, marketing,
and apps for maximized security and user-friendliness. Cloud apps are also
available for companies to use for on-the-go capabilities.

c. Big Data Analytics

Big data is a trend that allows businesses to analyze extensive sets of


information to achieve variety in increasing volumes and growth of velocity. Big
data has a high return on investment that boosts the productivity of marketing
campaigns, due to its ability to enable high-functioning processing. Data mining
is a way companies can predict growth opportunities and achieve future success.
Examination of data to understand markets and strategies is becoming more
manageable with advances in data analytic programs.

This practice in information technology can be observed for its potential in


data management positions for optimal organizations. Database maintenance is
a growing sector of technology careers. To convert various leads into paying
customers, big data is an essential trend to continue following in 2019.

d. Automation

Another current trend in the IT industry is automated processes. Automated


processes can collect information from vendors, customers, and other
documentation. Automated processes that check invoices and other accounts-
payable aspects expedite customer interactions. Machine processes can
automate repetitive manual tasks, rather than assigning them to employees. This
increases organization-wide productivity, allowing employees to use their
valuable time wisely, rather than wasting it on tedious work.

Automation can even produce more job opportunities for IT professionals


trained in supporting, programming, and developing automated processes.
Machine learning can enhance these automated processes for a continually
developing system. Automated processes for the future will extend to groceries
and other automatic payment methods to streamline the consumer experience.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________

Emerging Trends in Information Technology


Trends in information technology emerging in 2019 are new and innovative ways
for the industry to grow. These movements in information technology are the areas
expected to generate revenue and increase demand for IT jobs. Pay attention to these
technological changes and unique products that enhance business operations.

a. Artificial Intelligence and Smart Machines

What is Artificial Intelligence?

According to Encyclopedia, Artificial intelligence (AI), is the ability of a digital


computer or computercontrolled robot to perform tasks commonly associated with
intelligent beings. The term is frequently applied to the project of developing systems
endowed with the intellectual processes characteristic of humans, such as the ability to
reason, discover meaning, generalize, or learn from past experience.

Figure 1.1 Artificial Intelligence

Artificial Intelligence, or AI, has already received a lot of buzz in recent years, but
it continues to be a trend to watch because its effects on how we live, work, and play
are only in the early stages. In addition, other branches of AI have developed, including
Machine Learning, which we will go into below. AI refers to computer systems built to
mimic human intelligence and perform tasks such as recognition of images, speech or
patterns, and decision making. AI can do these tasks faster and more accurately than
humans.

Five out of six Americans use AI services in one form or another every day, including
navigation apps, streaming services, smartphone personal assistants, ride-sharing apps,
home personal assistants, and smart home devices. In addition to consumer use, AI is
used to schedule trains, assess business risk, predict maintenance, and improve energy
efficiency, among many other money-saving tasks.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
In fact, Artificial intelligence are already being used in different organization to
help solve problems such as AI face recognition is beginning to help with missing people
reports, and it even helps identify individuals for criminal investigations when cameras
have captured their images. According to the National Institute of Standards and
Technology, face recognition is most effective when AI systems and forensic facial
recognition experts’ team up. AI will continue to promote safety for citizens in the future
as software improvements shape these applications.

Medical AI is another trend that reflects surprising success. Given patient


information and risk factors, AI systems can anticipate the outcome of treatment and
even estimate the length of a hospital visit. Deep learning is one way AI technology gets
applied to health records to find the likelihood of a patient’s recovery and even mortality.
Experts evaluate data to discover patterns in the patient’s age, condition, records, and
more.

Home AI systems are also increasingly popular to expedite daily tasks like listening
to tunes, asking for restaurant hours, getting directions, and even sending messages.
Many problem-solving AI tools also help in the workplace, and the helpfulness of this
technology will
continue to progress in
2020.

Figure 1.2 Ai Systems: Alexa, Google Assistant, Siri, Bixby

b. Virtual Reality

Virtual reality (VR), the use of computer modeling and simulation that enables a
person to interact with an artificial three-dimensional (3-D) visual or other sensory
environment. VR applications immerse the user in a computer-generated environment
that simulates reality through the use of interactive devices, which send and receive
information and are worn as goggles, headsets, gloves, or body suits. In a typical VR
format, a user wearing a helmet with a stereoscopic screen views animated images of a
simulated environment. The illusion of “being there” (telepresence) is effected by motion
sensors that pick up the user’s movements and adjust the view on the screen accordingly,
usually in real time (the instant the user’s movement takes place). Thus, a user can tour a
simulated suite of rooms, experiencing changing viewpoints and perspectives that are
convincingly related to his own head turnings and steps. Wearing data gloves equipped
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
with force-feedback devices that provide the sensation of touch, the user can even pick
up and manipulate objects that he sees in the virtual environment.

Virtual Reality’s most immediately-recognizable component is the head-mounted


display (HMD). Human beings are visual creatures, and display technology is often the
single biggest difference between immersive Virtual Reality systems and traditional user
interfaces.

Figure 1.3 CAVE automatic virtual environment

For instance, CAVE automatic virtual environments actively display virtual content
onto room-sized screens. While they are fun for people in universities and big labs,
consumer and industrial wearables are the wild west.

With a multiplicity of emerging hardware and software options, the future of


wearables is unfolding but yet unknown. Concepts such as the HTC Vive Pro Eye, Oculus
Quest and Playstation VR are
leading the way, but there are also
players like Google, Apple,
Samsung, Lenovo and others who
may surprise the industry with new
levels of immersion and usability.
Whomever comes out ahead, the
simplicity of buying a helmet-sized
device that can work in a living-
room, office, or factory floor has
made HMDs center stage when it
comes to Virtual Reality
technologies.
Figure 1.4 Oculus Rift
Whilst VR is known for transforming the gaming and entertainment industry in
particular, with consoles and handhelds adapting their games for VR the gaming
experience has been utterly transformed and improved all around. The connection
between game and player becomes far closer as gamers are completely immersed into
their own gaming world.
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
VR is also beginning to revolutionize other industries such as healthcare, retail and
education, which is already aiding tasks in the sectors, from helping patients with anxiety
relax, and helping students learn more by experiencing what they are being educated
on.

c. Augmented Reality

Augmented reality is a more versatile and practical version of virtual reality, as it


does not fully immerse individuals in an experience. Augmented reality features
interactive scenarios that enhance the real world with images and sounds that create
an altered experience. The most common current applications of this overlay of digital
images on the surrounding environment include the recent Pokémon Go fad.

As it happens, phones and tablets are the way augmented reality gets into most
people's lives. One of the most popular ways AR has infiltrated everyday life is through
mobile games. In 2016, the AR game
"Pokémon Go" became a sensation
worldwide, with over 100 million estimated
users at its peak, according to CNET. It ended
up making more than $2 billion and counting,
according to Forbes. The game allowed users
to see Pokémon characters bouncing
around in their own town. The goal was to
capture these pocket monsters using your
smartphone camera, and then use them to
battle others, locally, in AR gyms.
Another app called Layar uses the
smartphone's GPS and its camera to collect
information about the user's surroundings. It
then displays information about nearby
restaurants, stores and points of interest.

Figure 1.5 Pokémon Go

Augmented reality can impact many industries in useful ways. Airports are
implementing augmented-reality guides to help people get through their checks and
terminals as quickly and efficiently as possible. Retail and cosmetics are also using
augmented reality to let customers test products, and furniture stores are using this mode
to lay out new interior design options.

This doesn't mean that phones and tablets will be the only venue for AR. Research
continues apace on including AR functionality in contact lenses, and other wearable
devices. The ultimate goal of augmented reality is to create a convenient and natural
immersion, so there's a sense that phones and tablets will get replaced, though it isn't
clear what those replacements will be. Even glasses might take on a new form, as "smart
glasses" are developed for blind people. Like any new technology, AR has a lot of
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
political and ethical issues. Google Glass, for example, raised privacy concerns. Some
worried that conversations might be surreptitiously recorded or pictures snapped, or
thought that they might be identified by face recognition software. AR glasses, contacts
and more, like the Glass - X and Google Lens, though, are moving ahead in production
and sales.

The possibilities for augmented reality in the future revolve around mobile
applications and health care solutions. Careers in mobile app development and design
will be abundant, and information technology professionals can put their expertise to use
in these interactive experiences.

d. Blockchain Data

Blockchain data, like the new cryptocurrency Bitcoin, is a secure method that will
continue to grow in popularity and use in 2019. This system allows you to input additional
data without changing, replacing, or deleting anything. In the influx of shared data
systems like cloud storage and resources, protecting original data without losing
important information is crucial.

Blockchain in simple terms is a system of recording information in a way that makes


it difficult or impossible to change, hack, or cheat the system. A blockchain is essentially
a digital ledger of transactions that is duplicated and distributed across the entire
network of computer systems on the blockchain.

The authority of many parties keeps the data accounted for without turning over
too much responsibility to certain employees or management staff. For transaction
purposes, blockchain data offers a safe and straightforward way to do business with
suppliers and customers. Private data is particularly secure with blockchain systems, and
the medical and information technology industries can benefit equally from added
protection.

e. Internet of Things

The Internet of Things (IoT) is an emerging movement of products with integrated


Wi-Fi and network connectivity abilities. Cars, homes, appliances, and other products
can now connect to the Internet, making activities around the home and on the road
an enhanced experience. Use of IoT allows people to turn on music hands-free with a
simple command, or lock and unlock their doors even from a distance.

Many of these functions are helping organizations in customer interaction,


responses, confirmations, and payments. Remote collection of data assists companies
the most. IoT almost acts like a digital personal assistant. The intelligent features of some
of these IoT products can aid in many company procedures. Voice recognition and
command responses will allow you to access stored data on cloud services.

IoT enriches the IT industry, especially in job creation. Within the next few years,
IoTrelated careers will increase, and there will be a need for 200,000 additional IT workers,
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
according to IT Pro Today. Design, troubleshooting, and support of IoT products need
extensive training and a specific set of skills.

f. 5G

5G is the 5th generation mobile network. It is a new global wireless standard after
1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to
connect virtually everyone and everything together including machines, objects, and
devices.

5G wireless technology is meant to deliver higher multi-Gbps peak data speeds,


ultra low latency, more reliability, massive network capacity, increased availability, and
a more uniform user experience to more users. Higher performance and improved
efficiency empower new user experiences and connects new industries.

5G is a unified, more capable air interface. It has been designed with an extended
capacity to enable next-generation user experiences, empower new deployment
models and deliver new services. With high speeds, superior reliability and negligible
latency, 5G will expand the mobile ecosystem into new realms. 5G will impact every
industry, making safer transportation, remote healthcare, precision agriculture, digitized
logistics — and more — a reality.

Broadly speaking, 5G is used across three main types of connected services,


including enhanced mobile broadband, mission-critical communications, and the
massive IoT. A defining capability of 5G is that it is designed for forward compatibility—
the ability to flexibly support future services that are unknown today.

Enhanced mobile broadband In addition to making our smartphones better, 5G


mobile technology can usher in new immersive experiences such as VR and AR with
faster, more uniform data rates, lower latency, and lower costper-bit.

Mission-critical communications 5G can enable new services that can transform


industries with ultra-reliable, available, low-latency links like remote control of critical
infrastructure, vehicles, and medical procedures. Massive

IoT 5G is meant to seamlessly connect a massive number of embedded sensors in


virtually everything through the ability to scale down in data rates, power, and mobility—
providing extremely lean and low-cost connectivity solutions.

References
• https://youtu.be/6YaXKxXSli0
• https://youtu.be/mLg95dLm-Gs
• https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT
• https://www.wired.com/story/wired-guide-internet-of-things/
• https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-
internet-thingsthat-anyone-can-understand/#16d8137b1d09
Republic of the Philippines
Romblon State University
Romblon, Philippines

_____________________________________________________________________________________
• https://www.vistacollege.edu/blog/careers/it/trends-in-information-technology-
for-2019/
• https://www.simplilearn.com/top-technology-trends-and-jobs-article
• https://thebossmagazine.com/future-virtual-reality/
• https://www.livescience.com/34843-augmented-reality.html
• https://www.qualcomm.com/invention/5g/what-is-5g

You might also like