It Era Midterm
It Era Midterm
I. Objectives
At the end of this module, you should be able to:
• Discuss the importance of being a responsible netizen by following the rules of common courtesy online
and the informal “rules of the road” of cyberspace.
• Discuss the difference between privacy and security.
• Explain various risks to internet privacy
II. Lecture
Netiquette
What is Netiquette?
What is Netiquette? Simple stated, it’s network etiquette – that is the etiquette of cyberspace and “etiquette”
means the forms of required by good breeding or prescribed by authority to be required in social or official
life. In other words, netiquette is a set of rules for behaving properly online.
Netiquette, or network etiquette, is concerned with the "proper" way to communicate in an online
environment. Consider the following "rules," adapted from Virginia Shea's the Core Rules of Netiquette,
whenever you communicate in the virtual world.
When you use e-mail, instant messenger, video calls, or discussion boards to communicate with others
online, please be sure to follow the rules of professional online communications known as netiquette.
These rules will help you communicate with instructors, classmates, and potential employers more
effectively and will help prevent misunderstandings.
REMEMBER THE GOLDEN RULE – Even though you may be interacting with a computer screen, you are
communicating with a real person who will react to your message. Make a good impression - treat others
with the same respect that you would like to receive and avoid confrontational or offensive language.
To help convey meaning when creating messages, it is sometimes acceptable to include appropriate
emoticon symbols, such as a smiley face :) However, for professional communications these would be
1
inappropriate.
AVOID SLANG, ACRONYMS, AND TEXT TALK – Communicating effectively in college and business
environments require the use of correct terminology, spelling, and grammar that can easily be understood.
For example, use “your” instead of “ur”.
AVOID “SCREAMING” IN TYPED MESSAGES – Typing an entire message using all capital letters is
known as “screaming”. It is distracting and generally frowned upon in professional environments. It is better
to draw emphasis to selected words or phrases by: using italic or bold text; using a different color for text or
background color; or denoting emphasis using special characters (Example: **Important**).
2
RESPECT DIVERSITY IN VIEWPOINTS - Be constructive and respectful when sharing
opinions, beliefs, and criticisms, or responding to those of others in the conversation.
When sharing a viewpoint that differs from someone else’s, it is a best practice to first acknowledge
the other person by briefly restating what he or she said, but in your own words. This lets the
person know that you are listening and trying to understand them.
When presenting an opinion or criticism, it is helpful to use phrases that identify to whose point of
view you are referring. If the opinion is yours, you can begin with the phrase “In my experience” or
“In my opinion”. If it is a viewpoint of someone else, make sure you identify that in your message
(Example: “According to Eric Ericson,” or “The president believes”).
3
f) Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the ease in which
information can be shared or accessed and in fact, this "information sharing" capability is one of the
reasons the Internet was founded. So, in the spirit of the Internet's "founding fathers," share what you know!
When you post a question and receive intelligent answers, share the results with others. Are you an expert
at something? Post resources and references about your subject matter. Recently expanded your
knowledge about a subject that might be of interest to others? Share that as well.
g) Rule 7: Help keep flame wars under control What is meant by "flaming" and "flame wars?" "Flaming is
what people do when they express a strongly held opinion without holding back any emotion." (Shea,
1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While
"flaming" is not necessarily forbidden in virtual communication, "flame wars," when two or three people
exchange angry posts between one another, must be controlled or the camaraderie of the group could be
compromised.
Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction.
h) Rule 8: Respect other people's privacy Depending on what you are reading in the virtual world, be it an
online class discussion forum, Facebook page, or an email, you may be exposed to some private or
personal information that needs to be handled with care. Perhaps someone is sharing some medical news
about a loved one or discussing a situation at work. What do you think would happen if this information "got
into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect
your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when
deciding to discuss or not to discuss virtual communication.
i) Rule 9: Don't abuse your power Just like in face-to-face situations, there are people in cyberspace who
have more "power" than others. They have more expertise in technology or they have years of experience
in a particular skill or subject matter. Maybe it's you who possesses all of this knowledge and power! Just
remember: knowing more than others do or having more power than others may have does not give you
the right to take advantage of anyone. Think of Rule 1: Remember the human.
j) Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of experience
working in the virtual world. And not everyone knows the rules of netiquette. At some point, you will see a
stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens,
practice kindness and forgiveness as you would hope someone would do if you had committed the same
offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake,
do so in a private email rather than a public forum.
Cybercrimes
What is Cyber?
It is the Characteristics of the culture of computers, information, technology and virtual reality.
4
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing,
spamming and child pornography) is used as a tool to commit an offense.
Cybercriminals may use computer technology to access personal information, business trade secrets or
use the internet for exploitative or malicious purposes.
Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved on
September 12,2012 which aims to address legal issues concerning online interactions and internet.
Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal information.
b. Plagiarism
An act or instance of using or closely imitating the language and thoughts of another author without
authorization.
c. Computer Addiction
• Offline: generally used when speaking about excessive gaming behavior, which can be practiced both
offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in general from scientific research than
offline computer addiction, mainly because most cases of computer addiction are related to the excessive
use of the Internet.
*Virtual Self -The persona you create about yourself virtually.
CRIMINAL ACTIVITIES
a. Hacking
• Unauthorized access of or interference with computer systems, servers, or other information and
communication systems
5
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other
information and communication systems without the computer or system owner’s knowledge and consent
• The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of such data
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is committed against critical infrastructure of the
Philippines the, penalty is between 12-20 years reclusion temporal
• Six years up to twelve years of imprisonment also known as prison mayor.
c. Electronic theft
• Illegal Downloading
• Obtaining files that you do not have the right to use from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video, computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
d. Cyberbullying
6
• The use of electronic communication to bully a person, typically by sending a message
of an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
e. Cybersex
• Willful engagement, maintenance, control, or operation, directly or indirectly of any
lascivious exhibition of sexual organs or sexual activity with the aid of a computer
system for favor or consideration.
• There is a discussion on this matter if it involves “couples” or “people in relationship”
who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor
f. Child Pornography
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti- Child
Pornography Act of 2009, committed through a computer system.
• Penalty of 12-20 years of imprisonment or reclusion temporal
g. Cyber Defamation
• Is an unprivileged false statement of fact which tends to harm the reputation of a person or company.
• Penalty of 6-12 years of imprisonment or prison mayor.
Internet Threats
Hacking
Hacking is a term used to describe actions taken by someone to gain unauthorized
access to a computer. The availability of information online on the tools, techniques,
and malware makes it easier for even non-technical people to undertake malicious
activities.
The process by which cyber criminals gain access to your computer.
7
• Install a Trojan horse, providing a back door for hackers to enter and search for your information.
Malware
Malware is one of the more common ways to infiltrate or damage your computer.
Malicious software that infects your computer, such as computer viruses, worms, Trojan
horses, spyware, and adware.
Pharming
Pharming is a common type of online fraud.
A means to point you to a malicious and illegitimate website by redirecting the legitimate
URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
Phishing
Phishing is used most often by cyber criminals because it's easy to execute and can
produce the results they're looking for with very little effort.
8
Fake emails, text messages and websites created to look like they're from authentic companies. They're
sent by criminals to steal personal and financial information from you. This is also known as “spoofing”.
What it does:
• Trick you into giving them information by asking you to update, validate or confirm your
account. It is often presented in a manner than seems official and intimidating, to
encourage you to take action.
• Provides cyber criminals with your username and passwords so that they can access your accounts (your
online bank account, shopping accounts, etc.) and steal your credit card numbers.
Ransomware
Ransomware is a type of malware that restricts access to your computer or your files
and displays a message that demands payment in order for the restriction to be
removed. The two most common means of infection appear to be phishing emails that
contain malicious attachments and website pop-up advertisements.
What it can do:
• There are two common types of ransomware:
• Lockscreen ransomware: displays an image that prevents you from accessing your computer
• Encryption ransomware: encrypts files on your system's hard drive and sometimes on
shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing
you from opening them
• Ransomware will display a notification stating that your computer or data have been locked and
demanding a payment be made for you to regain access. Sometimes the notification states that authorities
have detected illegal activity on your computer, and that the payment is a fine to avoid prosecution.
9
Spam
Spam is one of the more common methods of both sending information out and
collecting it from unsuspecting people.
The mass distribution of unsolicited messages, advertising or pornography to addresses
which can be easily found on the Internet through things like social networking sites,
company websites and personal blogs.
What it can do:
• Annoy you with unwanted junk mail.
• Create a burden for communications service providers and businesses to filter electronic messages.
• Phish for your information by tricking you into following links or entering details with too good- to-be-true
offers and promotions.
• Provide a vehicle for malware, scams, fraud and threats to your privacy.
Trojan Horses
A Trojan horse may not be a term you're familiar with, but there's a good chance you or
someone you know has been affected by one.
A malicious program that is disguised as, or embedded within, legitimate software.
It is an executable file that will install itself and run automatically once it's downloaded.
What it can do:
• Delete your files.
10
• Use your computer to hack other computers.
• Watch you through your web cam.
• Log your keystrokes (such as a credit card number you entered in an online purchase).
• Record usernames, passwords and other personal information.
Viruses
Most people have heard of computer viruses, but not many know exactly what they are
or what they do.
Malicious computer programs that are often sent as an email attachment or a download
with the intent of infecting your computer, as well as the computers of everyone in your
contact list. Just visiting a site can start an automatic download a virus.
What they can do:
• Send spam.
• Provide criminals with access to your computer and contact lists.
• Scan and find personal information like passwords on your computer.
• Hijack your web browser.
• Disable your security settings.
• Display unwanted ads.
• When a program is running, the virus attached to it could infiltrate your hard drive and also spread
to USB keys and external hard drives. Any attachment you create using this program and send to someone
else could also infect them with the virus.
11
• Your computer screen looks distorted.
• Programs are running without your control.
• If you suspect a problem, make sure your security software is up to date and run it to check for
infection. If nothing is found, or if you are unsure of what to do, seek technical help.
Wi-Fi Eavesdropping
WiFi eavesdropping is another method used by cyber criminals to capture personal
information.
Virtual “listening in” on information that's shared over an unsecure (not encrypted) WiFi
network.
What it can do:
• Potentially access your computer with the right equipment.
• Steal your personal information including logins and passwords.
III. Application/Activity
IV. Assessment
https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT
https://www.wired.com/story/wired-guide-internet-of-things/
https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things- that-
anyone-can-understand/#16d8137b1d09
https://www.vistacollege.edu/blog/careers/it/trends-in-information-technology-for-2019/
https://www.simplilearn.com/top-technology-trends-and-jobs-article
https://thebossmagazine.com/future-virtual-reality/
https://www.livescience.com/34843-augmented-reality.html
https://www.qualcomm.com/invention/5g/what-is-5g
12
COLLEGE OF INFORMATION TECHNOLOGY
First Semester, A.Y. 2023-2024
MODULE 4
Digital Technology and Social Changes
I. Objectives
At the end of this module, learners are expected to:
• Identify what are the current and emerging trends in technology;
• Understand how technology affects culture and society trough through the different advancements in
technology;
• Asses the positive and negative effects of said advancement
• Explain the role of ICT in social change.
II. Lecture
Internet of Things
The "Internet of things" (IoT) is becoming an increasingly growing topic of conversation both in the
workplace and outside of it. It's a concept that not only has the potential to impact how we live but also how
we work. But what exactly is the "Internet of things" and what impact is it going to have on you, if any?
13
Lightbulbs, along with refrigerators, coffee makers, microwave ovens, baby monitors, security cameras,
speakers, televisions, and thermostats have, in the past few decades, transformed from ordinary objects
into conduits for the future. Embedded with sensors that see, hear, and touch the world around them, they
can turn physical information into digital data. Collectively, these devices — and there are billions of them
around the world—make up the “internet of things.”
Just about anything with network connectivity belongs to the internet of things, from security cameras and
speakers to smart watches and denim jackets. In the “smart home,” these internets enabled gadgets
liberate us from our chores, give us back some of our time, and add a dash of novelty to ordinary
experiences. (“Alexa, turn on the disco lights.”) But the internet of things is about more than just using your
voice to preheat the oven or using your phone to turn off the lights.
The real promise of the internet of things is making our physical surroundings accessible to our digital
computers, putting sensors on everything in the world and translating it into a digital format.
Internet-connected objects could be the key to unlocking predictions about everything from consumer
behavior to climate events, but those same objects could invite hackers into personal spaces and leak
intimate data. Depending on who you ask, the growing internet of things either represents the promise of
technology—the thing that will reinvent modern life as we know it—or that which will be our technological
undoing.
The connectivity, networking and communication protocols used with these web-enabled devices largely
depend on the specific IoT applications deployed.
IoT can also make use of artificial intelligence (AI) and machine learning to aid in making data collecting
processes easier and more dynamic.
14
Why IoT is important
The internet of things helps people live and work smarter, as well as gain complete control over their lives.
In addition to offering smart devices to automate homes, IoT is essential to business. IoT provides
businesses with a real-time look into how their systems really work, delivering insights into everything from
the performance of machines to supply chain and logistics operations.
IoT enables companies to automate processes and reduce labor costs. It also cuts down on waste and
improves service delivery, making it less expensive to manufacture and deliver goods, as well as offering
transparency into customer transactions. As such, IoT is one of the most important technologies of
everyday life, and it will continue to pick up steam as more businesses realize the potential of connected
devices to keep them competitive.
How Does This Impact You?
The new rule for the future is going to be, "Anything that can be connected, will be connected." But why on
earth would you want so many connected devices talking to each other? There are many examples for
what this might look like or what the potential value might be. Say for example you are on your way to a
meeting; your car could have access to your calendar and already know the best route to take. If the traffic
is heavy your car might send a text to the other party notifying them that you will be late. What if your alarm
clock wakes up you at 6 a.m. and then notifies your coffee maker to start brewing coffee for you? What if
your office equipment knew when it was running low on supplies and automatically re-ordered more? What
if the wearable device you used in the workplace could tell you when and where you were most active and
productive and shared that information with other devices that you used while working?
On a broader scale, the IoT can be applied to things like transportation networks: "smart cities" which can
help us reduce waste and improve efficiency for things such as energy use; this helping us understand and
improve how we work and live. The reality is that the IoT allows for virtually endless opportunities and
connections to take place, many of which we can't even think of or fully understand the impact of today.
1999
Kevin Ashton coins the term “internet of things” to describe the eyes and ears of a computer
2000
LG introduces its first connected refrigerator with a $20,000 pricetag
2008
The world’s first IoT conference is held in Zurich, Switzerland
2010
Tony Fadell founds Nest, maker of the smart thermostat
15
2013
Oxford Dictionary adds the term “internet of things”
2014
Amazon introduces the Echo speaker, along with the Alexa voice assistant—a new way to control the smart
home
2016
The Mirai botnet infects over 600,000 IoT devices with malware
2020
The number of internet-connected devices, by some estimates, exceeds 20 billion
The first internet-connected “thing” to make use of this new protocol was a toaster. John Romkey, a
software engineer and early internet evangelist, had built one for the 1990 showfloor of Interop, a trade
show for computers. Romkey dropped a few slices of bread into the toaster and, using a clunky computer,
turned the toaster on. It would still be a decade before anyone used the phrase “internet of things,” but
Romkey’s magic little toaster showed what a world of internet-connected things might be like. (Of course, it
wasn’t fully automated; a person still had to introduce the bread.) It was part gimmick, part proof of concept
—and fully a preview of what was to come.
The term “internet of things” itself was coined in 1999, when Kevin Ashton put it in a PowerPoint
presentation for Procter & Gamble. Ashton, who was then working in supply chain optimization, described a
system where sensors acted like the eyes and ears of a computer—an entirely new way for computers to
see, hear, touch, and interpret their surroundings.
As home internet became ubiquitous and Wi-Fi sped up, the dream of the smart home started to look more
like a reality. Companies began to introduce more and more of these inventions: “smart” coffee makers to
brew the perfect cup, ovens that bake cookies with precision timing, and refrigerators that automatically
restocked expired milk. The first of these, LG’s internet-connected refrigerator, hit the market in 2000. It
could take stock of shelf contents, mind expiration dates, and for some reason, came with an MP3 player. It
also cost $20,000. As sensors became cheaper, these internet-connected devices became more affordable
for more consumers. And the invention of smart plugs, like those made by Belkin, meant that even ordinary
objects could become “smart”—or, at least, you could turn them on and off with your phone.
Any IoT system today contains a few basic components. First, there’s the thing outfitted with sensors.
These sensors could be anything that collects data, like a camera inside a smart refrigerator or an
accelerometer that tracks speed in a smart running shoe. In some cases, sensors are bundled together to
gather multiple data points: a Nest thermostat contains a thermometer, but also a motion sensor; it can
adjust the temperature of a room when it senses that nobody’s in it. To make sense of this data, the device
has some kind of network connectivity (Wi-Fi, Bluetooth, cellular, or satellite) and a processor where it can
be stored and analyzed. From there, the data can be used to trigger an action—like ordering more milk
when the carton in the smart refrigerator runs out, or adjusting the temperature automatically given a set of
rules.
Most people didn’t start building an ecosystem of “smart” devices in their homes until the mass adoption of
voice controls. In 2014, Amazon introduced the Echo, a speaker with a helpful voice assistant named Alexa
built in. Apple had introduced Siri, its own voice assistant, four years prior— but Siri lived on your phone,
while Alexa lived inside the speaker and could control all of the “smart” devices in your house. Positioning a
voice assistant as the centerpiece of the smart home had several effects: It demystified the internet of
things for consumers, encouraged them to buy more internet-enabled gadgets, and encouraged developers
to create more “skills,” or IoT commands, for these voice assistants to learn
The same year that Amazon debuted Alexa, Apple came out with HomeKit, a system designed to facilitate
interactions between Apple-made smart devices, sending data back and forth to create a network. These
unifying voices have shifted the landscape away from single-purpose automations and toward a more
holistic system of connected things. Tell the Google Assistant “goodnight,” for example, and the command
16
can dim the lights, lock the front door, set the alarm system, and turn on your alarm clock. LG’s
SmartThinQ platform connects many home appliances, so you can select a chocolate chip cookie recipe
from the screen of your smart fridge and it’ll automatically preheat the oven. Manufacturers bill this as the
future, but it’s also a convenient way to sell more IoT devices. If you already have an Amazon Echo, you
might as well get some stuff for Alexa to control.
By 2014, the number of internet-connected devices would surpass the number of people in the world. David
Evans, the former chief futurist at Cisco, estimated in 2015 that “an average 127 new things are connected
to the internet” every second. Today, there are over 20 billion connected things in the world, according to
estimates from Gartner. The excitement around the brave new internet- connected world has been
matched with concern . All of these objects, brought to life like Pinocchio, have made the world easier to
control: You can let the delivery man in the front door, or change the temperature inside the house, all with
a few taps on a smartphone.
IoT encourages companies to rethink the ways they approach their businesses and gives them the tools to
improve their business strategies.
Generally, IoT is most abundant in manufacturing, transportation and utility organizations, making use of
sensors and other IoT devices; however, it has also found use cases for organizations within the
agriculture, infrastructure and home automation industries, leading some organizations toward digital
transformation.
IoT can benefit farmers in agriculture by making their job easier. Sensors can collect data on rainfall,
humidity, temperature and soil content, as well as other factors, that would help automate farming
techniques.
The ability to monitor operations surrounding infrastructure is also a factor that IoT can help with.
17
Sensors, for example, could be used to monitor events or changes within structural buildings, bridges and
other infrastructure. This brings benefits with it, such as cost saving, saved time, quality-of-life workflow
changes and paperless workflow.
A home automation business can utilize IoT to monitor and manipulate mechanical and electrical systems
in a building. On a broader scale, smart cities can help citizens reduce waste and energy consumption.
IoT touches every industry, including businesses within healthcare, finance, retail and manufacturing.
Advantages of IoT
• ability to access information from anywhere at any time on any device;
• improved communication between connected electronic devices;
• transferring data packets over a connected network saving time and money; and
• automating tasks helping to improve the quality of a business's services and reducing the need for human
intervention.
Disadvantages of IoT
• As the number of connected devices increases and more information is shared between devices, the
potential that a hacker could steal confidential information also increases.
• Enterprises may eventually have to deal with massive numbers -- maybe even millions – of IoT devices,
and collecting and managing the data from all those devices will be challenging.
• If there's a bug in the system, it's likely that every connected device will become corrupted.
• Since there's no international standard of compatibility for IoT, it's difficult for devices from different
manufacturers to communicate with each other.
18
Wearable devices with sensors and software can collect and analyze user data, sending messages to other
technologies about the users with the aim of making users' lives easier and more comfortable. Wearable
devices are also used for public safety -- for example, improving first responders' response times during
emergencies by providing optimized routes to a location or by tracking construction workers' or firefighters'
vital signs at life-threatening sites.
In healthcare, IoT offers many benefits, including the ability to monitor patients more closely using an
analysis of the data that's generated. Hospitals often use IoT systems to complete tasks such as inventory
management for both pharmaceuticals and medical instruments.
Smart buildings can, for instance, reduce energy costs using sensors that detect how many occupants are
in a room. The temperature can adjust automatically -- for example, turning the air conditioner on if sensors
detect a conference room is full or turning the heat down if everyone in the office has gone home.
In agriculture, IoT-based smart farming systems can help monitor, for instance, light, temperature, humidity
and soil moisture of crop fields using connected sensors. IoT is also instrumental in automating irrigation
systems.
In a smart city, IoT sensors and deployments, such as smart streetlights and smart meters, can help
alleviate traffic, conserve energy, monitor and address environmental concerns, and improve sanitation.
Risk of bricking aside, connecting things to the internet also leaves those objects, and everything else on
your Wi-Fi network, more vulnerable to hackers. Laura DeNardis, in her recent book The Internet in
Everything, has called this threat to cybersecurity the greatest human rights issue of our time. The risk isn’t
just that some prankster breaks into your smart washing machine and upsets the spin cycle, or that your
Nest camera gets hijacked with a message to subscribe to PewDiePie’s YouTube channel. (Yes, that really
happened.) A hacked smart lock means someone can open your front door. Hack into enough smart water
heaters and you can send a city into a massive blackout. And one vulnerable device can compromise the
whole network. As WIRED’s Lily Hay Newman points out , “IoT devices have been conscripted into
19
massive botnets, compromised for nation-state reconnaissance, hacked to mine cryptocurrency, and
manipulated in assaults on power grids.”
The threat to internet-connected devices comes not just because they’re connected to the internet, but
because device manufacturers have not always designed their products with security as a priority. In 2016,
malware called Mirai exploited these kinds of vulnerabilities in over 600,000 IoT devices to create a
massive distributed denial of service (DDoS) attack. The following year, an attack called Krack infected
nearly every internet-connected device connected to Wi-Fi. The attack was crippling and difficult to defend
against, in part because the internet of things runs on so many disparate operating systems. When a phone
or a computer gets hit with a virus, software makers are generally quick to issue a patch. But things like
routers or internet-connected doorbells don’t usually receive software updates needed to protect against
vulnerabilities, and many of them weren’t built with the same kind of security protocols as computers. After
the Krack attack, one security researcher predicted that we would stitll “find vulnerable devices 20 years
from now.”
Then there’s the question of privacy. If cameras and microphones are studded around your home, they are
definitely watching and listening to you. Everything in the internet of things collects data— and all that data
has value. In a recent study, researchers found that 72 of the 81 IoT devices they surveyed had shared
data with a third party unrelated to the original manufacturer. That means the finer details of your personal
life—as depicted by your smart toothbrush, your smart TV, or your smart speaker—can be repackaged and
sold to someone else. Google and Apple both admitted, last year, that the recordings captured by their
smart speakers are reviewed by contractors, including awkward and intimate snippets of audio. Amazon
has partnerships with over 400 police departments, who use the footage from its Ring doorbell cameras to
keep watch on neighborhoods. An ever-expanding internet of things doesn’t just have consequences for
personal privacy. It can create a network of computer eyes and ears everywhere we go. Because IoT
devices are closely connected, all a hacker has to do is exploit one vulnerability to manipulate all the data,
rendering it unusable. Manufacturers that don't update their devices regularly -- or at all -- leave them
vulnerable to cybercriminals.
Additionally, connected devices often ask users to input their personal information, including names, ages,
addresses, phone numbers and even social media accounts -- information that's invaluable to hackers.
Hackers aren't the only threat to the internet of things; privacy is another major concern for IoT users. For
instance, companies that make and distribute consumer IoT devices could use those devices to obtain and
sell users' personal data.
Beyond leaking personal data, IoT poses a risk to critical infrastructure, including electricity, transportation
and financial services.
20
body temperature or the house automatically locks itself when you get into bed. Your clothes might come
with connected sensors, too, so that the things around you can respond to your movements in real time.
That’s already starting to happen: In 2017, Google announced Project Jacquard, an effort to create the
connected wardrobe of the future.
This vision extends far beyond your clothes, and even your home. You’ll also have smart offices, smart
buildings, smart cities. Smart hospital rooms will have sensors to ensure that doctors wash their hands, and
airborne sensors will help cities predict mudslides and other natural disasters. Autonomous vehicles will
connect to the internet and drive along roads studded with sensors, and governments will manage the
demands on their energy grids by tracking household energy consumption through the internet of things.
The growth of the internet of things could also lead to new kinds of cyber warfare; imagine a bad actor
disabling every smart thermostat in the dead of winter, or hacking into internet-connected pacemakers and
insulin pumps. It could create new class systems: those with robot maids, and those without. Or, as Ray
Bradbury described in one short story from 1950, all the people might disappear—but the smart homes,
preparing meals and sweeping the floors, will live on.
If we’re going to get there—whether we like “there” or not—we’re going to need faster internet. ( Enter :
5G .) We’ll also need to keep all those devices from mucking up the airwaves , and we’ll need to find a
better way to secure the data that’s transmitted across those airwaves. Recently, the Swiss cryptography
firm Teserakt introduced an idea for a cryptographic implant for IoT devices, which would protect the
data that streams from these devices. There are also ideas for creating a better standard for IoT devices,
and plans to help them get along with each other, regardless of which company makes them or which voice
assistant lives inside.
A. CLOUD COMPUTING
B. MOBILE COMPUTING AND APPLICATIONS
C. BIG DATA ANALYTICS
D. AUTOMATION
a. Cloud Computing
Cloud computing is a network of resources a company can access, and this method of using a digital drive
increases the efficiency of organizations. Instead of local storage on computer hard drives, companies will
be freeing their space and conserving funds. According to Forbes, 83 percent of enterprise workloads will
be in the cloud by 2020, which means 2019 will show an increasing trend closing in on this statistic.
Cloud storage and sharing is a popular trend many companies have adopted and even implemented for
employee interaction. A company-wide network will help businesses save on information technology
21
infrastructure. Cloud services will also extend internal functions to gain revenue. Organizations that offer
cloud services will market these for external products and continue their momentum.
Organizations will transfer their stored files across multiple sources using virtualization. Companies are
already using this level of virtualization, but will further embrace it in the year to come. Less installation
across company computers is another positive result of cloud computing because the Internet allows direct
access to shared technology and information. The freedom of new products and services makes cloud
computing a growing trend .
d. Automation
Another current trend in the IT industry is automated processes. Automated processes can collect
information from vendors, customers, and other documentation. Automated processes that check invoices
and other accounts-payable aspects expedite customer interactions. Machine processes can automate
repetitive manual tasks, rather than assigning them to employees. This increases organization-wide
productivity, allowing employees to use their valuable time wisely, rather than wasting it on tedious work.
Automation can even produce more job opportunities for IT professionals trained in supporting,
programming, and developing automated processes. Machine learning can enhance these automated
22
processes for a continually developing system. Automated processes for the future will extend to groceries
and other automatic payment methods to streamline the consumer experience.
Artificial Intelligence, or AI, has already received a lot of buzz in recent years, but it continues to be a trend
to watch because its effects on how we live, work, and play are only in the early stages. In addition, other
branches of AI have developed, including Machine Learning, which we will go into below. AI refers to
computer systems built to mimic human intelligence and perform tasks such as recognition of images,
speech or patterns, and decision making. AI can do these tasks faster and more accurately than humans.
Five out of six Americans use AI services in one form or another every day, including navigation apps,
streaming services, smartphone personal assistants, ride-sharing apps, home personal assistants, and
smart home devices. In addition to consumer use, AI is used to schedule trains, assess business risk,
predict maintenance, and improve energy efficiency, among many other money-saving tasks.
In fact, Artificial intelligence are already being used in different organization to help solve problems such as
AI face recognition is beginning to help with missing people reports, and it even helps identify individuals for
criminal investigations when cameras have captured their images. According to the National Institute of
Standards and Technology, face recognition is most effective when AI systems and forensic facial
23
recognition experts’ team up. AI will continue to promote safety for citizens in the future as software
improvements shape these applications.
Medical AI is another trend that reflects surprising success. Given patient information and risk factors, AI
systems can anticipate the outcome of treatment and even estimate the length of a hospital visit. Deep
learning is one way AI technology gets applied to health records to find the likelihood of a patient’s recovery
and even mortality. Experts evaluate data to discover patterns in the patient’s age, condition, records, and
more.
Home AI systems are also increasingly popular to expedite daily tasks like listening to tunes, asking for
restaurant hours, getting directions, and even sending messages. Many problem-solving AI tools also help
in the workplace, and the helpfulness of this technology will continue to progress in 2020.
b. Virtual Reality
Virtual reality (VR), the use of computer modeling and simulation that enables a person to interact with an
artificial three-dimensional (3-D) visual or another sensory environment. VR applications immerse the user
in a computer-generated environment that simulates reality through the use of interactive devices, which
send and receive information and are worn as goggles, headsets, gloves, or body suits.
With a multiplicity of emerging hardware and software options, the future of wearables is unfolding but yet
unknown. Concepts such as the HTC Vive Pro Eye, Oculus Quest and Playstation VR are leading the
way, but there are also players like Google, Apple, Samsung, Lenovo and others who may surprise the
industry with new levels of immersion and usability. Whomever comes out ahead, the simplicity of buying
a helmet-sized device that can work in a living-room, office, or factory floor has made HMDs center stage
when it comes to Virtual Reality technologies.
24
Oculus Rift
Whilst VR is known for transforming the gaming and entertainment industry in particular, with consoles
and handhelds adapting their games for VR the gaming experience has been utterly transformed and
improved all around. The connection between game and player becomes far closer as gamers are
completely immersed into their own gaming world.
VR is also beginning to revolutionize other industries such as healthcare, retail and education, which is
already aiding tasks in the sectors, from helping patients with anxiety relax, and helping students learn
more by experiencing what they are being educated on.
c. Augmented Reality
Augmented reality is a more versatile and practical version of virtual reality, as it does not fully immerse
individuals in an experience. Augmented reality features interactive scenarios that enhance the real world
with images and sounds that create an altered experience.
25
As it happens, phones and tablets are the way augmented reality gets into most people's lives. One of the
most popular ways AR has infiltrated everyday life is through mobile games. In 2016, the AR game
"Pokémon Go" became a sensation worldwide, with over 100 million estimated users at its peak, according
to CNET. It ended up making more than $2 billion and counting, according to Forbes. The game allowed
users to see Pokémon characters bouncing around in their own town. The goal was to capture these
pocket monsters using your smartphone camera, and then use them to battle others, locally, in AR gyms.
Another app called Layar uses the smartphone's GPS and its camera to collect information about the user's
surroundings. It then displays information about nearby restaurants, stores and points of interest.
Augmented reality can impact many industries in useful ways. Airports are implementing augmented-reality
guides to help people get through their checks and terminals as quickly and efficiently as possible. Retail
and cosmetics are also using augmented reality to let customers test products, and furniture stores are
using this mode to lay out new interior design options.
This doesn't mean that phones and tablets will be the only venue for AR. Research continues apace on
including AR functionality in contact lenses, and other wearable devices. The ultimate goal of augmented
reality is to create a convenient and natural immersion, so there's a sense that phones and tablets will get
replaced, though it isn't clear what those replacements will be. Even glasses might take on a new form, as
"smart glasses" are developed for blind people. Like any new technology, AR has a lot of political and
ethical issues. Google Glass, for example, raised privacy concerns. Some worried that conversations might
be surreptitiously recorded or pictures snapped, or thought that they might be identified by face recognition
software. AR glasses, contacts and more, like the Glass - X and Google Lens, though, are moving ahead in
production and sales.
The possibilities for augmented reality in the future revolve around mobile applications and health care
solutions. Careers in mobile app development and design will be abundant, and information technology
professionals can put their expertise to use in these interactive experiences.
d. Blockchain Data
Blockchain data, like the new cryptocurrency Bitcoin, is a secure method that will continue to grow in
popularity and use in 2019. This system allows you to input additional data without changing, replacing, or
deleting anything. In the influx of shared data systems like cloud storage and resources, protecting original
data without losing important information is crucial.
e. Internet of Things
The Internet of Things (IoT) is an emerging movement of products with integrated Wi-Fi and network
connectivity abilities. Cars, homes, appliances, and other products can now connect to the Internet, making
activities around the home and on the road an enhanced experience. Use of IoT allows people to turn on
music hands-free with a simple command, or lock and unlock their doors even from a distance.
Many of these functions are helping organizations in customer interaction, responses, confirmations, and
payments. Remote collection of data assists companies the most. IoT almost acts like a digital personal
assistant. The intelligent features of some of these IoT products can aid in many company procedures.
Voice recognition and command responses will allow you to access stored data on cloud services.
26
IoT enriches the IT industry, especially in job creation. Within the next few years, IoTrelated careers will
increase, and there will be a need for 200,000 additional IT workers, according to IT Pro Today. Design,
troubleshooting, and support of IoT products need extensive training and a specific set of skills.
f. 5G
5G is the 5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G, and 4G
networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything
together including machines, objects, and devices.
5G wireless technology is meant to deliver higher multi-Gbps peak data speeds, ultra low latency, more
reliability, massive network capacity, increased availability, and a more uniform user experience to more
users. Higher performance and improved efficiency empower new user experiences and connects new
industries.
5G is a unified, more capable air interface. It has been designed with an extended capacity to enable next-
generation user experiences, empower new deployment models and deliver new services. With high
speeds, superior reliability and negligible latency, 5G will expand the mobile ecosystem into new realms.
5G will impact every industry, making safer transportation, remote healthcare, precision agriculture,
digitized logistics — and more — a reality. Broadly speaking, 5G is used across three main types of
connected services, including enhanced mobile broadband, mission-critical communications, and the
massive IoT. A defining capability of 5G is that it is designed for forward compatibility—the ability to flexibly
support future services that are unknown today. Enhanced mobile broadband In addition to making our
smartphones better, 5G mobile technology can usher in new immersive experiences such as VR and AR
with faster, more uniform data rates, lower latency, and lower cost- per-bit. Mission-critical communications
5G can enable new services that can transform industries with ultra-reliable, available, low-latency links like
remote control of critical infrastructure, vehicles, and medical procedures. Massive IoT 5G is meant to
seamlessly connect a massive number of embedded sensors in virtually everything through the ability to
scale down in data rates, power, and mobility—providing extremely lean and low-cost connectivity
solutions.
III. Application/Activity
IV. Assessment
VI. Other References
https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT
https://www.wired.com/story/wired-guide-internet-of-things/
https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things- that-
anyone-can-understand/#16d8137b1d09
https://www.vistacollege.edu/blog/careers/it/trends-in-information-technology-for-2019/
https://www.simplilearn.com/top-technology-trends-and-jobs-article
https://thebossmagazine.com/future-virtual-reality/
https://www.livescience.com/34843-augmented-reality.html
27
https://www.qualcomm.com/invention/5g/what-is-5g
Prepared by:
VENUS T. BOMBAY
Faculty, CIT
28