GE10 LearningModule4

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

SAMAR COLLEGE

G.E. 10
Living in the IT Era
Self-Learning Module 4

2021-2022
2nd Semester
Self-Learning Module 4
GE 10 l Living in the IT Era

SAMAR COLLEGE

Learning Module in

GE 10: Living in the


IT Era

Course Description

This is a three (3) unit course which aims to strike a balance between conceptual
instruction and socially- and culturally-oriented discussions as it not only explains the
basic concepts or key terms in IT but also features the major IT trends along with the
issues and challenges these developments bring. Moreover, it uses the outcomes-
based approach with assessment tests and tasks to effectively measure student
learning.

Samar College l College of Education 1


Self-Learning Module 4
GE 10 l Living in the IT Era

Chapter 5: IT, Culture, and the Society

5.0 Intended Learning Outcomes


At the end of this chapter, the students should be able to:
a. Explain automation and its impact on the society;
b. Analyze how IT influences culture and social behavior;
c. Enumerate the rules of netiquette; and
d. Describe cyberbullying and identify the steps to combat it.

5.1 Introduction
This chapter focus on the trends and issues in IT. The influence of IT on culture
and social behavior is likewise analyzed with emphasis on both the proper netiquette
and code of conduct for IT professionals and the negative practices in social media
such as cyberbullying.

5.2 Topics/Discussion

5.2.1 The Impact of IT on the Society

As previously discussed, the seven major trends for 2017 are as follows:

1. IoT and smart home technology


2. Augmented reality and virtual reality
3. Machine learning
4. Automation
5. Big data
6. Physical-digital integrations
7. Everything on demand

Majority of organizations and companies nowadays have taken these trends in


account, shifting manual business processes to automated ones and using ICT to
improve their products and services. Among these seven trends, the internet of
Things (IoT) and automation seem to have greatly influenced present-day culture
and society; thus, it imperative to discuss these thrusts in detail.

5.2.2 Internet of Things (IoT)

Internet of Things (IoT) is a set-up of devices and objects which are connected
together in a given network. Their connection, often wirelessly, is possible using both
hardware and software.

The hardware part is often made up of sensors that collect data, which are then
sent to other devices for analysis and possible interpretation. Popular examples are
health wearable devices such as step counters that are connected to a mobile phone
via Bluetooth. An app installed in the phone records the results in a daily, weekly, or
monthly basis for the mobile phone user to keep track of his or her progress.

Samar College l College of Education 2


Self-Learning Module 4
GE 10 l Living in the IT Era

Capabilities of IoT

A major requirement for IoT is a strong internet connection, as all devices must be
able to communicate with one another for the upload and download of needed data.
But aside from connectivity, IoT should also be capable of the following (Mattern &
Floekemeier):

1. Integration across technology and business


Sensors can be used to help improve business processes, such as machines
used for manufacturing and production, security systems, and even simple
ones like automatically turning on and off a light switch. Obviously, the
technology used for each application may vary, depending on the complexity
and use. Software used to interpret incoming data and sending commands to
the hardware must also be taken into account. Add to that the different
protocols and standards used for connecting, such as WiFi, Bluetooth, etc. An
IoT platform must be capable of integrating all of these so that the data may be
used efficiently to improve productivity and even make predictions for
optimum system performance.
2. Data analysis and synchronization
IoT should be capable of providing analytics to help organizations in their
decision-making. However, for this to be effective, data must be synchronized
to allow integration with all of the business aspects, including top
management, operations, and even customer relations (Markkula, 2016).
3. Security and service
With all of these devices being used and all of these data being collected, a
major concern is obviously security. To improve security, IoT devices are
usually divided into networks and each network has a different network
access, some more restricted than others, without compromising connection
and system integration. A typical example is your mobile phone notifying you
if you will allow a new device to connect to it via Bluetooth. Normally, it will
ask for a pairing connection via a simple ‘accept’ or using a more secure line
such as a pin code.

Applications of IoT

With improved business processes and employee productivity, it is only natural


for organizations to adopt IoT. In a study conducted by IoT Analysis, it was found
that most of the 1,600 IoT projects are applied in cities (Scully, 2018).

Topping the list are as follows:

1. Smart cities. Smart cities have adopted IoT in traffic management, waste
disposal, and even community monitoring for the security of the city’s
residents.
2. Connected industries. The oil and gas industry are identified as one of the front-
runners for IoT connectivity which includes remote access to heavy equipment
and machinery, from manufacturing to production.

Samar College l College of Education 3


Self-Learning Module 4
GE 10 l Living in the IT Era

3. Connected buildings. Connected building projects involve facility-automation to


reduce energy costs.
4. Connected cars. With smart cities adopting IoT for their traffic management, it
is no longer surprising for the latest car models to be equipped with sensors
and network connectivity. Majority of projects relating to smart vehicles
revolve around vehicle diagnostics and monitoring.
5. Smart energy. Majority of smart energy projects focus on developing smart
grids for renewable energy and infrastructure.

Challenges of IoT

But while things may look good using IoT, there are issues raised in adopting it
fully. Texas Instruments, Inc. (2016) has identified six challenges in its
implementation:

1. System requirements.
Industries normally identify different requirements, especially depending
on the type of industry they belong to. Those in the food industry may require
monitoring of perishable goods, from production and packaging to shipping.
An automobile manufacturer may have the same process, but since products
are different, requirements may also change. Food will require data regarding
temperature levels, whereas cars will require mechanical precision.
2. Connectivity.
With the varying connections—wired and wireless, as well as the different
protocols governing each connection, it will be a challenge to come up with an
IoT project concerning such protocols.
3. Power requirements.
Iot devices need to run on batteries as majority of these devices are mobile.
The challenge, therefore, is how to extend the battery life on such devices,
especially those used in critical procedures, such as health, disaster
management, and safety.
4. Security.
One of the most highlighted issues in the application of IoT is data security.
Confidential information such as patients’ records or employees’ profiles are
considered at risk. Security also includes system integrity, with malicious acts
such as hacking and viruses proliferating online.
5. Development.
The task of creating IoT projects may seem daunting, so one of the
challenges identified is how to expand the capabilities of developers, and not
just experts, in order to create more “smart things”.
6. Services.
With data collected from IoT, it is important as well to determine where all
this will go and to identify the platform in which these IoT applications will be
placed. Nowadays, cloud services offer end-to-end solutions to a number of
IoT projects.

Samar College l College of Education 4


Self-Learning Module 4
GE 10 l Living in the IT Era

5.2.3 Automation

With the available technology and standards for computer system interconnection,
the demand for system automation is on the rise. Colloquially called
“computerization,” having an automated system means automated business
processes, operations, service provider, monitoring, and even tools.

 Robotic Process Automation (RPA)


The Institute for Robotic Process Automation and Artificial Intelligence
(IRPAAI) defined robotic process automation (RPA) as “the application of
technology that allows employees in a company to configure computer software
or a “robot” to capture and interpret existing applications for processing a
transaction, manipulating data, triggering responses and communicating with
other digital systems” (Institute for Robotic communicating with other digital
systems” (Institute for Robotic Process Automation & Artificial Intelligence, 2018,
para. 3). While some may think of “robots” similar to those seen in movies, RPA
actually focuses on computers being able to make logical decisions on the business
process so that their human counterparts can focus on other tasks, thus increasing
work productivity. This may not necessarily translate into hardware. Application
systems and software may also be considered as RPA as they are applicable to the
following:
▪ Process Automation
The use not only of industrial robots but also of “presentation-layer
automation software” is capable of carrying out the daily operations of an
organization. Process automation may include finance systems such as
payroll, customer management system such as online system registration,
and academic institutions offering online enrollment systems, among
others.
▪ IT Support Management
Management of IT infrastructure and complex systems becomes
easier using RPA. If part of the system fails, an automated system can
immediately send notifications to the IT manager and technical support
staff, informing them of the problem. Large buildings, for example, employ
an automated emergency system, so if an emergency exit door has been
opened, or a fire alarm goes off, the system will automatically detect the
exact location of the opened door or activated alarm, as the location of the
emergency will typically be assumed to be near that point.
▪ Automated Assistants
Apple’s Siri is an example of a voice recognition software used in
RPAs. Instead of machine language (binary), computers will be able to
understand human language and interact with the same. Another example
for automated assistants will be banks having an automated customer
service hotline. Customers call the bank, and instead of a human operator,
an automated assistant will respond asking for details such as service
choices, account numbers, etc. Customers will use their phone’s touch key
to enter choices and numbers while the computer interprets them as input

Samar College l College of Education 5


Self-Learning Module 4
GE 10 l Living in the IT Era

data. After processing, a computer-generated report, such as account


balances and other information will be provided.
 Sensors
Sensors are hardware devices that have the capability to measure an event,
object, or any physical quality that is happening. Examples include the heart rate
of a person while jogging, the temperature of a room, brightness of a light source,
and the like. Sensors have the capacity to connect to other devices that can keep
track of the data they are measuring. A mobile phone can be connected to a heart
rate sensor to record and monitor a person’s health on a weekly or monthly basis.
A web application can be accessed to monitor and control CCTV operation of a
house or building. These sensors can be connected to a network, in various ways
as explained earlier. However, there are several, in various ways as explained
earlier. However, there are several types of sensors, and with technology made
available today, almost all of this hardware can now be automated.
Sensors can be classified as analog or digital, but below is a list of sensors used
in automation:
 Temperature sensor
This sensor is capable of measuring temperature as well as detecting its rise
or fall. This is helpful in system that are temperature-sensitive such as power
plants and server rooms.
 Infrared (IR) sensor
This sensor often used for security purposes detects infrared light. It is
commonly used along with an infrared light source. You might have seen it in
movies in which a villain trying to access a restricted area would avoid crossing a
series of IR sensors shown as beams of red lines. Breaking or crossing the beam of
red line would trigger an alarm.
 Ultrasonic sensor
An ultrasonic sensor detects sound waves, such as how radars and sonars
pick up sounds. A typical application is a light fixture turning on if the owner claps
his or her hands, and turning off once he or she claps again.
 Touch sensor
Through touch, the sensor activates itself and becomes capable of doing its
function. The latest versions of Samsung and Apple smartphones now have a one-
touch login to access the device, instead of a pin code or a pattern. Combining a
touch sensor with biometrics, users can now access the content of their phones
with just a single touch on the home button.
 Proximity sensor
This sensor is able to detect objects within a certain range, even if the object
is not physically touching the sensor yet. It is typically used in the light fixtures of
houses and buildings. The light turns on if it detects a person is close by. This helps
save on electricity as well as secure the premises.
 Pressure sensor
A pressure sensor helps determine the weight or impact of a certain object.
It is normally used by manufacturing companies, such as automobile companies,
in designing their airbag system. They need to create an airbag that is strong
enough to cushion a driver upon a head-on collision, but not too strong to injure
him or her due to the recoil.

Samar College l College of Education 6


Self-Learning Module 4
GE 10 l Living in the IT Era

 Level sensor
This sensor can detect the level of liquids, fluids, grainy or granular
materials, such as powders, etc. Level sensors are used for disaster risk
management system, such as a flood monitoring if a flooded street will be passable
by light vehicles or not.
 Smoke/Gas sensor
This sensor is used to detect the presence of dangerous fumes such as
carbon monoxide caused by fire. Smoke alarms show how this sensor works.

5.2.4 The Influence of IT on Culture and Social Behavior

With the prevalence of technology getting widespread, there are issues, both
positive and negative, that surface. In Chapter 1, the positive and negative effects that
ICT brings to individuals, organizations, and society are discussed. But regardless of
whether the effect is positive or negative, the sudden surge of ICT has created an
influence on how people’s lives have been changed, for better and for worse. However,
it is important to note that any positive effect a person wants to see should not rely
solely on the technology; it should also focus on self-realization and social interaction.

Formerly called the “texting-capital of the world” due to the high number of SMS
being sent and received on a daily basis, the Philippines is now dubbed as the “most
social nation” in a 2015 study conducted by Opera Mini. The study identified that
mobile phone users in the Philippines access social media more than any other sites.
In Opera Mini’s top 50-user countries worldwide, the Philippines ranked first with an
86% page-view. With smartphones becoming cheaper and more accessible, people get
to spend more time online, wherever and whenever they want to due to its mobility.
The smartphone adoption rate has grown from 41% to 55% in a span of one year with
Android as the most popular OS. The study also found that Filipinos view on average,
699 web pages per month. That is close to 23 pages viewed per day.

5.2.5 Influence on Culture

 Online Reviews
With the proliferation of online information, it is easy to find details on a
certain movie or a book. However, with sites such as Rotten Tomatoes, one can
actually make a decision on what movie to watch simply by reading the “reviews”
of other people. If the review is “good,” then he or she might consider other
movies. This trend of having other people do the task first for others—watching
the full movie and information people online if the film is worth watching or not—
is an example of how technology affects the basic human behavior of decision-
making.
 Weblogging/Social Media
Nowadays, food bloggers post pictures of their meals in restaurants along
with a food review. This trend created a culture of people dining with friends or
family without actually interacting with them. People would first take pictures of
their meal and post it online. Others, during the course of the meal, would even
use their phones to update their online status instead of talking to other people in

Samar College l College of Education 7


Self-Learning Module 4
GE 10 l Living in the IT Era

their group. This is one typical example of technology, in the form of weblogging
and social media, affecting social interaction.
 YouTube Learners
YouTube is one of the most popular social media sites. People can watch
videos, comment on them, and upload their own videos, among others. Thus,
YouTube serves as a source of videos with people searching for almost about
anything online—from trivial topics to more serious subject matter. This fact
influences the acquisition of knowledge and learning of certain skill sets. Instead
of reading books or listening to their teacher’s class lecture, students would rather
watch YouTube to learn the lesson. Again, this is another situation in which
technology affects the culture, this time, of learning.

5.2.6 Influence on Social Behavior

Cyberbullying

Behavioral choices especially of teenagers or adolescents are influenced by


technologies. Cyberbullying, for example, is a serious phenomenon brought about by
social media.

Cyberbullying is an unwanted, hostile behavior done by individuals to other


people in the hope of gaining control over them. Cyberbullies can be classmates,
neighbors, or officemates. Victims of bullying often end up with personal traumas.
And since the act of bullying is done online, the attackers may also be individuals you
do not know as they hide behind their internet profiles.

An internet profile, also called an internet identity, online identity, or internet


person, is a profile created by internet users to establish their social identity in online
communities, social media sites, and other websites. Because some consider an online
identity to be a possible breach in privacy, this has led to the creation of an online
“mask,” an online profile created through a series of questions (username, gender, age,
etc.). However, this “mask” may lead to a misdirection, or in a worse case, to
misinformation. For example, while a handle or username “student2006” may mean
that the user is a student, “2006” may mean either the user’ year of birth or year
entering school.

Unfortunately, some internet profiles are created to intentionally mislead or


misinform people, in the previous example, it is possible that the user is randomly
created and it is not at all related to the user’s real identity. Choosing a gender also
gives the user the option to either be a boy or a girl. Setting the birthdate online gives
the person the option to either be younger or older especially since Facebook requires
its users to be at least 13 years of age before they can create an account. Registering
someone who is 13 years and below on their behalf is also now allowed and is
considered to be a violation of their terms and conditions (Facebook, 2018). However,
again, one can indicate any age and continue using Facebook when he or she is below
the minimum age requirement. This misdirection or misinformation may have
dangerous consequences, which is why it is important to follow the netiquette rule on
personalizing IT.
Samar College l College of Education 8
Self-Learning Module 4
GE 10 l Living in the IT Era

The internet profile, be it true or misleading, apparently gives people the


confidence they would not normally have if they are in a face-to-face confrontation. A
seemingly innocent picture, for instance, or a grammatically wrong post may be
criticized or bashed.

Cyberbullying comes in the form of messages or images, such as memes. Since


messages or images can be posted anonymously, it is hard and oftentimes, difficult to
trace the source. It becomes more problematic if the message or image gets re-posted
and distributed quickly online, or goes “viral.” Finding the original post might prove
to be even harder.

Victims of cyberbullying may experience the same trauma as a real-life bullying


victim. The difference, however, it that cyberbullying is on a much larger scale.
Defending oneself from this kind of attack is difficult as most of the cyberbullies use
internet personas which, as previously discussed, may be real or not. Even their actual
location may be difficult to trace.

The good news is that the society—communities and the government—are


devising ways to stop bullying – be it digital or otherwise. As discussed in the previous
chapter, the Philippines has identified several laws, including the Cyber Crime
Prevention Act, also known as R.A. 10175, to help catch cyberbullies.

But, ultimately, in order to prevent cyberbullying from happening, individuals


especially the youth are encouraged to talk to their families and friends in case they
experience such a situation online. Involving parents and teachers in young
individuals’ social media activities such as adding them to Facebook may help, if not,
stop cyberbullying as they can also see any untoward incidents happening to these
youngsters while online (Prevent Cyberbullying, 2017).

Netiquette

Netiquette is a combination of the world internet and etiquette. It describes how one
should act online. Netiquette brings in policies for all the features and qualities of the
internet, including the use of the World Wide Web (WWW), email services, File
Transfer Protocol (FTP), chat rooms, and instant messaging. There are different types
of netiquettes implemented all over the world.

 Netiquette for Social Media

The use of social media such as Facebook, Twitter, Instagram, LinkedIn, and
others is neither a bad habit nor a good habit in one’s personal life. Using social
media is good for easy communication with friends and even long-lost friends and
relatives. But there are some netizens who use their social media accounts to
discredit other people by posting or shouting ruthless words about a particular
person or sharing a status that maligns one’s character or reputation.

Some of the rules of netiquette for social media are as follows (Spira, 2010):

Samar College l College of Education 9


Self-Learning Module 4
GE 10 l Living in the IT Era

a. The Personalize IT Rule. Make sure to put restrictions in accepting friends or


followers on your social media (e.g., Facebook, Twitter, Instagram, LinkedIn).
It is not about having the greatest number of followers or friends. What matters
is who you interact with and how you interact with them.
b. The Off-limits Rule. Know your limitations when voicing out your opinions on
different subjects or topics concerning your school, religion, personal
information, workplace, and even some controversial subjects such as politics.
Knowing your limitations can save you from dire consequences later on.
c. The Tag – You’re It Rule. Be careful in tagging someone either in your status post
or photos. You may also restrict someone from tagging you in their posts and
photos. Always think of your safety, as well as others’ personal boundaries.

 Netiquette for Email Services, Chat Rooms, and Instant Messaging

Email services such as sending and receiving an email from someone


(professional to personal) anywhere in the world are used in numerous contexts.

 Netiquette for Chat Rooms and Instant Messaging

Joining chat rooms and sending instant messages, although mandatory in


social media, have become a trend for users. This is especially beneficial for people
working in different places such as a person working overseas while his or her
friend or relative is in the Philippines. Instead of spending for telcom services, the
person just needs internet connection.

Still, there are guidelines for using instant messaging applications. For
instance, someone might interrupt and request you to accept him or her or to be
connected to your account without your knowing who that person really is.

a. Think long and hard before accepting a private conversation, especially


with someone not on your friends list. Not everyone online may be as they
seem to be.
b. In a group chat, include only those that are in your friends list.
c. If possible, do not give your personal information while chatting, including
your photos or “selfies.”
d. When in doubt, save a copy or make a back-up of your conversation (chat).
e. You must log out from your account at all times, especially if you are in a
public place, such as a computer shop.
f. You may opt to customize your account settings from public to private
account.

Professional Ethics

While netiquette applies to all netizens, IT professionals specifically follow an


ethical practice as they are the front liners, support, and backend of ICT.

Samar College l College of Education 10


Self-Learning Module 4
GE 10 l Living in the IT Era

The Association of Computing Machinery (ACM) has identified 24 imperatives of


professional conduct for IT professional. It contains many, but not all, issues IT
professionals are likely to face while using, creating, and implementing ICT.

Section 1 outlines the fundamental ethical considerations while Section 2 provides


additional, more specific considerations of professional conduct. Section 3 is intended
specifically for individuals who have a leadership role, whether in the workplace or in
a volunteer capacity such as in organizations like ACM. Principles involving
compliance with this Code are laid out in Section 4.

1. General Moral Imperatives


As an ACM member, I will…
1.1 Contribute to society and human well-being
1.2 Avoid harm to others
1.3 Be honest and trustworthy
1.4 Be fair and take action not to discriminate
1.5 Honor property rights including copyrights and patent
1.6 Give proper credit for intellectual property
1.7 Respect the privacy of others
1.8 Honor confidentiality

2. More Specific Professional Responsibilities


As an ACM computing professional, I will…
2.1 Strive to achieve the highest quality,
2.2 Acquire and maintain professional competence
2.3 Know and respect existing laws persisting to professional work
2.4 Accept and provide appropriate professional review
2.5 Give comprehensive and thorough evaluations of computer systems and their impacts,
including analysis of possible risks
2.6 Honor contracts, agreements, and assigned responsibilities
2.7 Improve public understanding of computing and its consequences
2.8 Access computing and communication resources only when authorized to do so

3. Organizational Leadership Imperatives


As an ACM member and an organizational leader, I will…
3.1 Articulate social responsibilities of members of an organizational unit and encourage
full acceptance of those responsibilities
3.2 Manage personnel and resources to design and build information systems that enhance
the quality of working life
3.3 Acknowledge and support proper and authorized uses of an organization’s computing
and communication resources
3.4 Ensure that users and those who will be affected by a system have their needs clearly
articulated during the assessment and design of requirements, later, the system must
be validated to meet requirements
3.5 Articulate and support policies that protects the dignity of users and others affected by
a computing system

Samar College l College of Education 11


Self-Learning Module 4
GE 10 l Living in the IT Era

3.6 Create opportunities for members of the organization to learn the principles and
limitations of computer systems

4. Compliance With the Code


As an ACM member, I will…
4.1 Uphold and promote the principles of this Code
4.2 Treat violations of this code as inconsistent with membership in the ACM

-End of Chapter 5-

5.3 References

Caoili-Tayuan, R., Eleazar, M., (2019). Living in the Information Technology Era. C & E
Publishing, Inc.

5.4 Assessment/Activities

*See attached assessment/activities below.

Note: If you have queries regarding the module, feel free to send your message thru the
following:

Instructor: Carla Mae C. Pomentil


Messenger: Carla Criz Pomentil
Gmail: carlacrizpomentil@gmail.com

Samar College l College of Education 12


Self-Learning Module 4
GE 10 l Living in the IT Era

Name: Course/Year/Sec:

Subject Title: Subject Code:

✓ Unit 5: Activity 1

Direction: Write a self-reflection on cyberbullying by answering the following question


below. Write your reflection in an essay form. You may use the space below.

1. Have you, or has anyone you know, been cyberbullied?


2. What were the steps you, or that person, took to stop the incident? What are the
other ways that you think can combat cyberbullying?
3. What did you, or that person, learn from the experience?

Samar College l College of Education 13

You might also like